Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe

Overview

General Information

Sample name:Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe
Analysis ID:1490435
MD5:15cc82dce96d6980e2dc800b10a81495
SHA1:005a539c30f4a640457dcd8b047278e8a93dd61b
SHA256:7d39dde72383a557950523dfc9e5a64718323fcebf5d41aba286763c9ae7b39e
Tags:exe
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected FormBook
.NET source code contains potential unpacker
.NET source code contains very large array initializations
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Found direct / indirect Syscall (likely to bypass EDR)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates processes with suspicious names
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe (PID: 5920 cmdline: "C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe" MD5: 15CC82DCE96D6980E2DC800B10A81495)
    • powershell.exe (PID: 6468 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 5208 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe (PID: 1364 cmdline: "C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe" MD5: 15CC82DCE96D6980E2DC800B10A81495)
      • explorer.exe (PID: 4004 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
        • colorcpl.exe (PID: 2820 cmdline: "C:\Windows\SysWOW64\colorcpl.exe" MD5: DB71E132EBF1FEB6E93E8A2A0F0C903D)
          • cmd.exe (PID: 5616 cmdline: /c del "C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 2324 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
{"C2 list": ["www.jnhdh8827.com/pz12/"], "decoy": ["paucanyes.com", "autonwheels.com", "cowboysandcaviarbar.com", "fitnessuseredworkouts.com", "nuevobajonfavorito.com", "dflx8.com", "rothability.com", "sxybet88.com", "onesource.live", "brenjitu1904.com", "airdrop-zero1labs.com", "guangdongqiangzhetc.com", "apartments-for-rent-72254.bond", "ombak99.lol", "qqfoodsolutions.com", "kyyzz.com", "thepicklematch.com", "ainth.com", "missorris.com", "gabbygomez.com", "aromacuppa.com", "kaskusbagus.com", "zoox1.asia", "hemophilia-treatment-41433.bond", "meidupro.com", "shrisona.com", "sekanse.com", "marcocostasax.com", "loyalbahis356.com", "mzmz97.com", "ma-google.com", "xiangadvanced.site", "tuotalogis.com", "xcxocef.shop", "fidgetbottles.com", "shuaninvolved.site", "ambientelatino.com", "98980901.com", "singhbrothersframes.com", "pureamyl.com", "hgs0713.net", "surejobzapp.com", "slotgame99.bet", "datalakeflow.com", "ebehemin.com", "vanessasmobilespa.com", "317wb.com", "motchillssss.top", "huesch.net", "salesgymshark.shop", "mejorcompra99.com", "tacubashop.com", "jessicaxsimmons.com", "roar-stores.com", "chalkandthimble.com", "84556.vip", "luyutuwen.com", "siliconcollege.icu", "marvowhite.com", "gjxuh82y0u3h6.top", "e2taop5.top", "businessbroadway.com", "cripmz.xyz", "4hu259.com"]}
SourceRuleDescriptionAuthorStrings
00000007.00000002.3351494869.0000000003650000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000007.00000002.3351494869.0000000003650000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000007.00000002.3351494869.0000000003650000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x6251:$a1: 3C 30 50 4F 53 54 74 09 40
      • 0x1cbc0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0xa9cf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      • 0x158b7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
      00000007.00000002.3351494869.0000000003650000.00000004.00000800.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b927:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c92a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      00000007.00000002.3351494869.0000000003650000.00000004.00000800.00020000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
      • 0x18849:$sqlite3step: 68 34 1C 7B E1
      • 0x1895c:$sqlite3step: 68 34 1C 7B E1
      • 0x18878:$sqlite3text: 68 38 2A 90 C5
      • 0x1899d:$sqlite3text: 68 38 2A 90 C5
      • 0x1888b:$sqlite3blob: 68 53 D8 7F 8C
      • 0x189b3:$sqlite3blob: 68 53 D8 7F 8C
      Click to see the 25 entries
      SourceRuleDescriptionAuthorStrings
      4.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        4.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          4.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.400000.0.raw.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x6251:$a1: 3C 30 50 4F 53 54 74 09 40
          • 0x1cbc0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0xa9cf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
          • 0x158b7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
          4.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1b927:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1c92a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          4.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.400000.0.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
          • 0x18849:$sqlite3step: 68 34 1C 7B E1
          • 0x1895c:$sqlite3step: 68 34 1C 7B E1
          • 0x18878:$sqlite3text: 68 38 2A 90 C5
          • 0x1899d:$sqlite3text: 68 38 2A 90 C5
          • 0x1888b:$sqlite3blob: 68 53 D8 7F 8C
          • 0x189b3:$sqlite3blob: 68 53 D8 7F 8C
          Click to see the 15 entries

          System Summary

          barindex
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe", ParentImage: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe, ParentProcessId: 5920, ParentProcessName: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe", ProcessId: 6468, ProcessName: powershell.exe
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe", ParentImage: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe, ParentProcessId: 5920, ParentProcessName: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe", ProcessId: 6468, ProcessName: powershell.exe
          Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe", ParentImage: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe, ParentProcessId: 5920, ParentProcessName: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe", ProcessId: 6468, ProcessName: powershell.exe
          Timestamp:2024-08-09T09:23:41.928739+0200
          SID:2031453
          Severity:1
          Source Port:50152
          Destination Port:80
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-09T09:23:06.633806+0200
          SID:2031453
          Severity:1
          Source Port:50149
          Destination Port:80
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-09T09:22:41.789121+0200
          SID:2031453
          Severity:1
          Source Port:50146
          Destination Port:80
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: http://www.loyalbahis356.com/pz12/?tX9tN=1bMtYrqh7B54XFQP&uTm4D=mhHbh1AUgvkDqhcxvrHPgmJxw//lx/+38lrQrf/b9xTaJsLm+Z3/RBaY9L5MXxl4E5aW6imDag==Avira URL Cloud: Label: malware
          Source: http://www.shrisona.comAvira URL Cloud: Label: malware
          Source: http://www.pureamyl.com/pz12/www.317wb.comAvira URL Cloud: Label: malware
          Source: http://www.shrisona.com/pz12/Avira URL Cloud: Label: malware
          Source: http://www.motchillssss.topAvira URL Cloud: Label: malware
          Source: http://www.autonwheels.comAvira URL Cloud: Label: malware
          Source: http://www.loyalbahis356.com/pz12/www.guangdongqiangzhetc.comAvira URL Cloud: Label: malware
          Source: http://www.motchillssss.top/pz12/Avira URL Cloud: Label: malware
          Source: http://www.autonwheels.com/pz12/Avira URL Cloud: Label: malware
          Source: http://www.missorris.com/pz12/www.shrisona.comAvira URL Cloud: Label: malware
          Source: http://www.autonwheels.com/pz12/www.slotgame99.betAvira URL Cloud: Label: malware
          Source: http://www.loyalbahis356.comAvira URL Cloud: Label: malware
          Source: http://www.shrisona.com/pz12/www.cripmz.xyzAvira URL Cloud: Label: malware
          Source: https://loyalbahis356.com/pz12/?tX9tN=1bMtYrqh7B54XFQP&uTm4D=mhHbh1AUgvkDqhcxvrHPgmJxw//lx/Avira URL Cloud: Label: malware
          Source: http://www.missorris.com/pz12/Avira URL Cloud: Label: malware
          Source: http://www.nuevobajonfavorito.com/pz12/Avira URL Cloud: Label: malware
          Source: http://www.pureamyl.com/pz12/Avira URL Cloud: Label: malware
          Source: http://www.motchillssss.top/pz12/www.98980901.comAvira URL Cloud: Label: malware
          Source: http://www.nuevobajonfavorito.com/pz12/www.jnhdh8827.comAvira URL Cloud: Label: malware
          Source: 00000000.00000002.2171913312.00000000048BA000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.jnhdh8827.com/pz12/"], "decoy": ["paucanyes.com", "autonwheels.com", "cowboysandcaviarbar.com", "fitnessuseredworkouts.com", "nuevobajonfavorito.com", "dflx8.com", "rothability.com", "sxybet88.com", "onesource.live", "brenjitu1904.com", "airdrop-zero1labs.com", "guangdongqiangzhetc.com", "apartments-for-rent-72254.bond", "ombak99.lol", "qqfoodsolutions.com", "kyyzz.com", "thepicklematch.com", "ainth.com", "missorris.com", "gabbygomez.com", "aromacuppa.com", "kaskusbagus.com", "zoox1.asia", "hemophilia-treatment-41433.bond", "meidupro.com", "shrisona.com", "sekanse.com", "marcocostasax.com", "loyalbahis356.com", "mzmz97.com", "ma-google.com", "xiangadvanced.site", "tuotalogis.com", "xcxocef.shop", "fidgetbottles.com", "shuaninvolved.site", "ambientelatino.com", "98980901.com", "singhbrothersframes.com", "pureamyl.com", "hgs0713.net", "surejobzapp.com", "slotgame99.bet", "datalakeflow.com", "ebehemin.com", "vanessasmobilespa.com", "317wb.com", "motchillssss.top", "huesch.net", "salesgymshark.shop", "mejorcompra99.com", "tacubashop.com", "jessicaxsimmons.com", "roar-stores.com", "chalkandthimble.com", "84556.vip", "luyutuwen.com", "siliconcollege.icu", "marvowhite.com", "gjxuh82y0u3h6.top", "e2taop5.top", "businessbroadway.com", "cripmz.xyz", "4hu259.com"]}
          Source: www.jnhdh8827.comVirustotal: Detection: 11%Perma Link
          Source: www.jnhdh8827.com/pz12/Virustotal: Detection: 12%Perma Link
          Source: http://www.shrisona.comVirustotal: Detection: 8%Perma Link
          Source: http://www.jnhdh8827.com/pz12/www.ma-google.comVirustotal: Detection: 12%Perma Link
          Source: http://www.autonwheels.comVirustotal: Detection: 6%Perma Link
          Source: http://www.slotgame99.betVirustotal: Detection: 7%Perma Link
          Source: http://www.autonwheels.com/pz12/Virustotal: Detection: 5%Perma Link
          Source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeReversingLabs: Detection: 58%
          Source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeVirustotal: Detection: 53%Perma Link
          Source: Yara matchFile source: 4.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.3351494869.0000000003650000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.2227875031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2171913312.00000000048BA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3349619553.0000000003520000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeJoe Sandbox ML: detected
          Source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: colorcpl.pdbGCTL source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe, 00000004.00000002.2231174141.00000000015A0000.00000040.10000000.00040000.00000000.sdmp, Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe, 00000004.00000002.2228754932.0000000000D58000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000007.00000002.3346631053.00000000008F0000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: colorcpl.pdb source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe, 00000004.00000002.2231174141.00000000015A0000.00000040.10000000.00040000.00000000.sdmp, Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe, 00000004.00000002.2228754932.0000000000D58000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, colorcpl.exe, 00000007.00000002.3346631053.00000000008F0000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe, 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, colorcpl.exe, 00000007.00000002.3357917667.00000000051C0000.00000040.00001000.00020000.00000000.sdmp, colorcpl.exe, 00000007.00000003.2228323315.0000000004E5C000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000007.00000003.2231435212.000000000500B000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000007.00000002.3357917667.000000000535E000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe, Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe, 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, colorcpl.exe, colorcpl.exe, 00000007.00000002.3357917667.00000000051C0000.00000040.00001000.00020000.00000000.sdmp, colorcpl.exe, 00000007.00000003.2228323315.0000000004E5C000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000007.00000003.2231435212.000000000500B000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000007.00000002.3357917667.000000000535E000.00000040.00001000.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4x nop then pop ebx4_2_00407B1B
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4x nop then pop edi4_2_00416CEB
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 4x nop then pop ebx7_2_03287B1B
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 4x nop then pop edi7_2_03296CEB

          Networking

          barindex
          Source: Malware configuration extractorURLs: www.jnhdh8827.com/pz12/
          Source: global trafficHTTP traffic detected: GET /pz12/?tX9tN=1bMtYrqh7B54XFQP&uTm4D=mhHbh1AUgvkDqhcxvrHPgmJxw//lx/+38lrQrf/b9xTaJsLm+Z3/RBaY9L5MXxl4E5aW6imDag== HTTP/1.1Host: www.loyalbahis356.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /pz12/?uTm4D=rT/73z/FHFKsO0wYdmnc3t2OPINEEa6kIjITgDoEX6ai3/vo6h3AOPFXSKl3lYmsmBcXMl/3wg==&tX9tN=1bMtYrqh7B54XFQP HTTP/1.1Host: www.guangdongqiangzhetc.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /pz12/?uTm4D=tXrQrgXPfQCqrAqcdoT/KCxiftMWx+uc6jO1VE/0fl1BeE1n2goaTZbQHXHyD6os1JO7aTrmdA==&tX9tN=1bMtYrqh7B54XFQP HTTP/1.1Host: www.jnhdh8827.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
          Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
          Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: C:\Windows\explorer.exeCode function: 6_2_1158FF82 getaddrinfo,setsockopt,recv,6_2_1158FF82
          Source: global trafficHTTP traffic detected: GET /pz12/?tX9tN=1bMtYrqh7B54XFQP&uTm4D=mhHbh1AUgvkDqhcxvrHPgmJxw//lx/+38lrQrf/b9xTaJsLm+Z3/RBaY9L5MXxl4E5aW6imDag== HTTP/1.1Host: www.loyalbahis356.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /pz12/?uTm4D=rT/73z/FHFKsO0wYdmnc3t2OPINEEa6kIjITgDoEX6ai3/vo6h3AOPFXSKl3lYmsmBcXMl/3wg==&tX9tN=1bMtYrqh7B54XFQP HTTP/1.1Host: www.guangdongqiangzhetc.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /pz12/?uTm4D=tXrQrgXPfQCqrAqcdoT/KCxiftMWx+uc6jO1VE/0fl1BeE1n2goaTZbQHXHyD6os1JO7aTrmdA==&tX9tN=1bMtYrqh7B54XFQP HTTP/1.1Host: www.jnhdh8827.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficDNS traffic detected: DNS query: www.loyalbahis356.com
          Source: global trafficDNS traffic detected: DNS query: www.guangdongqiangzhetc.com
          Source: global trafficDNS traffic detected: DNS query: www.nuevobajonfavorito.com
          Source: global trafficDNS traffic detected: DNS query: www.jnhdh8827.com
          Source: global trafficDNS traffic detected: DNS query: www.ma-google.com
          Source: Network trafficSuricata IDS: 2031412 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.6:50152 -> 188.114.96.3:80
          Source: Network trafficSuricata IDS: 2031449 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.6:50152 -> 188.114.96.3:80
          Source: Network trafficSuricata IDS: 2031453 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.6:50152 -> 188.114.96.3:80
          Source: Network trafficSuricata IDS: 2031412 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.6:50146 -> 185.148.106.70:80
          Source: Network trafficSuricata IDS: 2031449 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.6:50146 -> 185.148.106.70:80
          Source: Network trafficSuricata IDS: 2031453 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.6:50146 -> 185.148.106.70:80
          Source: Network trafficSuricata IDS: 2031412 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.6:50149 -> 119.3.37.137:80
          Source: Network trafficSuricata IDS: 2031449 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.6:50149 -> 119.3.37.137:80
          Source: Network trafficSuricata IDS: 2031453 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.6:50149 -> 119.3.37.137:80
          Source: explorer.exe, 00000006.00000000.2173161867.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3365438539.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2173161867.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3365438539.000000000978C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
          Source: explorer.exe, 00000006.00000000.2173161867.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3365438539.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2173161867.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3365438539.000000000978C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
          Source: explorer.exe, 00000006.00000000.2173161867.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3365438539.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2173161867.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3365438539.000000000978C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
          Source: explorer.exe, 00000006.00000000.2173161867.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3365438539.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2173161867.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3365438539.000000000978C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
          Source: explorer.exe, 00000006.00000000.2173161867.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3365438539.000000000962B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
          Source: explorer.exe, 00000006.00000002.3364148653.0000000007B60000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000002.3364126550.0000000007B50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000000.2157798037.00000000028A0000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
          Source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe, 00000000.00000002.2163845733.00000000030BA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.317wb.com
          Source: explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.317wb.com/pz12/
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.317wb.comReferer:
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.98980901.com
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.98980901.com/pz12/
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.98980901.com/pz12/www.autonwheels.com
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.98980901.comReferer:
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ainth.com
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ainth.com/pz12/
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ainth.com/pz12/www.motchillssss.top
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ainth.comReferer:
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autonwheels.com
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autonwheels.com/pz12/
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autonwheels.com/pz12/www.slotgame99.bet
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autonwheels.comReferer:
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.cripmz.xyz
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.cripmz.xyz/pz12/
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.cripmz.xyz/pz12/www.pureamyl.com
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.cripmz.xyzReferer:
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.gabbygomez.com
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.gabbygomez.com/pz12/
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.gabbygomez.com/pz12/www.missorris.com
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.gabbygomez.comReferer:
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.guangdongqiangzhetc.com
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.guangdongqiangzhetc.com/pz12/
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.guangdongqiangzhetc.com/pz12/www.nuevobajonfavorito.com
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.guangdongqiangzhetc.comReferer:
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.jnhdh8827.com
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.jnhdh8827.com/pz12/
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.jnhdh8827.com/pz12/www.ma-google.com
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.jnhdh8827.comReferer:
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.loyalbahis356.com
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.loyalbahis356.com/pz12/
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.loyalbahis356.com/pz12/www.guangdongqiangzhetc.com
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.loyalbahis356.comReferer:
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ma-google.com
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ma-google.com/pz12/
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ma-google.com/pz12/www.ainth.com
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ma-google.comReferer:
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.missorris.com
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.missorris.com/pz12/
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.missorris.com/pz12/www.shrisona.com
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.missorris.comReferer:
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.motchillssss.top
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.motchillssss.top/pz12/
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.motchillssss.top/pz12/www.98980901.com
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.motchillssss.topReferer:
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.nuevobajonfavorito.com
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.nuevobajonfavorito.com/pz12/
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.nuevobajonfavorito.com/pz12/www.jnhdh8827.com
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.nuevobajonfavorito.comReferer:
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.pureamyl.com
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.pureamyl.com/pz12/
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.pureamyl.com/pz12/www.317wb.com
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.pureamyl.comReferer:
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.shrisona.com
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.shrisona.com/pz12/
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.shrisona.com/pz12/www.cripmz.xyz
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.shrisona.comReferer:
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.slotgame99.bet
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.slotgame99.bet/pz12/
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.slotgame99.bet/pz12/www.gabbygomez.com
          Source: explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.slotgame99.betReferer:
          Source: explorer.exe, 00000006.00000002.3366414703.00000000099AB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2174937509.00000000099AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
          Source: explorer.exe, 00000006.00000002.3371448733.000000000BFDF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2180275775.000000000BFDF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
          Source: explorer.exe, 00000006.00000000.2173161867.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3365438539.000000000962B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
          Source: explorer.exe, 00000006.00000000.2173161867.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3365438539.000000000962B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/I
          Source: explorer.exe, 00000006.00000002.3365438539.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2173161867.000000000973C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
          Source: explorer.exe, 00000006.00000000.2173161867.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3365438539.000000000962B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?
          Source: explorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=435B7A89D7D74BDF801F2DA188906BAF&timeOut=5000&oc
          Source: explorer.exe, 00000006.00000002.3365438539.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2173161867.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
          Source: explorer.exe, 00000006.00000002.3365438539.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2173161867.000000000973C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.com
          Source: explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
          Source: explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
          Source: explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
          Source: explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
          Source: explorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz
          Source: explorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz-dark
          Source: explorer.exe, 00000006.00000003.3075508887.000000000C087000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3371448733.000000000C087000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2180275775.000000000C048000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com-
          Source: explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
          Source: explorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAzME7S.img
          Source: explorer.exe, 00000006.00000002.3375867224.00000000111EF000.00000004.80000000.00040000.00000000.sdmp, colorcpl.exe, 00000007.00000002.3359339239.0000000005BFF000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://loyalbahis356.com/pz12/?tX9tN=1bMtYrqh7B54XFQP&uTm4D=mhHbh1AUgvkDqhcxvrHPgmJxw//lx/
          Source: explorer.exe, 00000006.00000003.3075508887.000000000C087000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3371448733.000000000C087000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2180275775.000000000C048000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.come
          Source: explorer.exe, 00000006.00000000.2180275775.000000000BFEF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3371448733.000000000BFEF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comEMd
          Source: explorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
          Source: explorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
          Source: explorer.exe, 00000006.00000002.3366414703.00000000099AB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2174937509.00000000099AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/e
          Source: explorer.exe, 00000006.00000003.3075508887.000000000C087000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3371448733.000000000C087000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2180275775.000000000C048000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.comM
          Source: explorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/10-things-rich-people-never-buy-and-you-shouldn-t-ei
          Source: explorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/money-matters-changing-institution-of-marriage/ar-AA
          Source: explorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-
          Source: explorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/savingandinvesting/americans-average-net-worth-by-age/ar-AA1h4ngF
          Source: explorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/how-donald-trump-helped-kari-lake-become-arizona-s-and-ameri
          Source: explorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/kevin-mccarthy-s-ouster-as-house-speaker-could-cost-gop-its-
          Source: explorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/republicans-already-barred-trump-from-being-speaker-of-the-h
          Source: explorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/trump-campaign-says-he-raised-more-than-45-million-in-3rd-qu
          Source: explorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/technology/a-federal-emergency-alert-will-be-sent-to-us-phones-nation
          Source: explorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/biden-administration-waives-26-federal-laws-to-allow-border-wall-c
          Source: explorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
          Source: explorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/us-supplies-ukraine-with-a-million-rounds-of-ammunition-seized-
          Source: explorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/travel/news/you-can-t-beat-bobby-flay-s-phoenix-airport-restaurant-one-of-
          Source: explorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/california-s-reservoirs-runneth-over-in-astounding-reve
          Source: explorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 4.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.3351494869.0000000003650000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.2227875031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2171913312.00000000048BA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3349619553.0000000003520000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 4.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 4.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 4.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 4.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 4.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 4.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000007.00000002.3351494869.0000000003650000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000007.00000002.3351494869.0000000003650000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000007.00000002.3351494869.0000000003650000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000006.00000002.3376444530.00000000115A7000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_772cc62d Author: unknown
          Source: 00000004.00000002.2227875031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000004.00000002.2227875031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000002.2227875031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.2171913312.00000000048BA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000000.00000002.2171913312.00000000048BA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.2171913312.00000000048BA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000007.00000002.3349619553.0000000003520000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000007.00000002.3349619553.0000000003520000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000007.00000002.3349619553.0000000003520000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: Process Memory Space: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe PID: 5920, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe PID: 1364, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: explorer.exe PID: 4004, type: MEMORYSTRMatched rule: Semi-Auto-generated - file ironshell.php.txt Author: Neo23x0 Yara BRG + customization by Stefan -dfate- Molls
          Source: Process Memory Space: colorcpl.exe PID: 2820, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.2ee18c8.0.raw.unpack, bg.csLarge array initialization: : array initializer size 37143
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.d470000.6.raw.unpack, bg.csLarge array initialization: : array initializer size 37143
          Source: initial sampleStatic PE information: Filename: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 0_2_012207D4 NtQueryInformationProcess,0_2_012207D4
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 0_2_01224D08 NtQueryInformationProcess,0_2_01224D08
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0041A360 NtCreateFile,4_2_0041A360
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0041A410 NtReadFile,4_2_0041A410
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0041A490 NtClose,4_2_0041A490
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0041A540 NtAllocateVirtualMemory,4_2_0041A540
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0041A35A NtCreateFile,4_2_0041A35A
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0041A40A NtReadFile,4_2_0041A40A
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222B60 NtClose,LdrInitializeThunk,4_2_01222B60
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222BF0 NtAllocateVirtualMemory,LdrInitializeThunk,4_2_01222BF0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222AD0 NtReadFile,LdrInitializeThunk,4_2_01222AD0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222D30 NtUnmapViewOfSection,LdrInitializeThunk,4_2_01222D30
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222D10 NtMapViewOfSection,LdrInitializeThunk,4_2_01222D10
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222DF0 NtQuerySystemInformation,LdrInitializeThunk,4_2_01222DF0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222DD0 NtDelayExecution,LdrInitializeThunk,4_2_01222DD0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222C70 NtFreeVirtualMemory,LdrInitializeThunk,4_2_01222C70
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222CA0 NtQueryInformationToken,LdrInitializeThunk,4_2_01222CA0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222F30 NtCreateSection,LdrInitializeThunk,4_2_01222F30
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222FB0 NtResumeThread,LdrInitializeThunk,4_2_01222FB0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222F90 NtProtectVirtualMemory,LdrInitializeThunk,4_2_01222F90
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222FE0 NtCreateFile,LdrInitializeThunk,4_2_01222FE0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222EA0 NtAdjustPrivilegesToken,LdrInitializeThunk,4_2_01222EA0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222E80 NtReadVirtualMemory,LdrInitializeThunk,4_2_01222E80
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01224340 NtSetContextThread,4_2_01224340
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01224650 NtSuspendThread,4_2_01224650
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222BA0 NtEnumerateValueKey,4_2_01222BA0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222B80 NtQueryInformationFile,4_2_01222B80
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222BE0 NtQueryValueKey,4_2_01222BE0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222AB0 NtWaitForSingleObject,4_2_01222AB0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222AF0 NtWriteFile,4_2_01222AF0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222D00 NtSetInformationFile,4_2_01222D00
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222DB0 NtEnumerateKey,4_2_01222DB0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222C00 NtQueryInformationProcess,4_2_01222C00
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222C60 NtCreateKey,4_2_01222C60
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222CF0 NtOpenProcess,4_2_01222CF0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222CC0 NtQueryVirtualMemory,4_2_01222CC0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222F60 NtCreateProcessEx,4_2_01222F60
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222FA0 NtQuerySection,4_2_01222FA0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222E30 NtWriteVirtualMemory,4_2_01222E30
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222EE0 NtQueueApcThread,4_2_01222EE0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01223010 NtOpenDirectoryObject,4_2_01223010
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01223090 NtSetValueKey,4_2_01223090
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012235C0 NtCreateMutant,4_2_012235C0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012239B0 NtGetContextThread,4_2_012239B0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01223D10 NtOpenProcessToken,4_2_01223D10
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01223D70 NtOpenThread,4_2_01223D70
          Source: C:\Windows\explorer.exeCode function: 6_2_11590E12 NtProtectVirtualMemory,6_2_11590E12
          Source: C:\Windows\explorer.exeCode function: 6_2_1158F232 NtCreateFile,6_2_1158F232
          Source: C:\Windows\explorer.exeCode function: 6_2_11590E0A NtProtectVirtualMemory,6_2_11590E0A
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05232D10 NtMapViewOfSection,LdrInitializeThunk,7_2_05232D10
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05232DF0 NtQuerySystemInformation,LdrInitializeThunk,7_2_05232DF0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05232DD0 NtDelayExecution,LdrInitializeThunk,7_2_05232DD0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05232C60 NtCreateKey,LdrInitializeThunk,7_2_05232C60
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05232C70 NtFreeVirtualMemory,LdrInitializeThunk,7_2_05232C70
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05232CA0 NtQueryInformationToken,LdrInitializeThunk,7_2_05232CA0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05232F30 NtCreateSection,LdrInitializeThunk,7_2_05232F30
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05232FE0 NtCreateFile,LdrInitializeThunk,7_2_05232FE0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05232EA0 NtAdjustPrivilegesToken,LdrInitializeThunk,7_2_05232EA0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05232B60 NtClose,LdrInitializeThunk,7_2_05232B60
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05232BE0 NtQueryValueKey,LdrInitializeThunk,7_2_05232BE0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05232BF0 NtAllocateVirtualMemory,LdrInitializeThunk,7_2_05232BF0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05232AD0 NtReadFile,LdrInitializeThunk,7_2_05232AD0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052335C0 NtCreateMutant,LdrInitializeThunk,7_2_052335C0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05234650 NtSuspendThread,7_2_05234650
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05234340 NtSetContextThread,7_2_05234340
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05232D30 NtUnmapViewOfSection,7_2_05232D30
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05232D00 NtSetInformationFile,7_2_05232D00
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05232DB0 NtEnumerateKey,7_2_05232DB0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05232C00 NtQueryInformationProcess,7_2_05232C00
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05232CF0 NtOpenProcess,7_2_05232CF0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05232CC0 NtQueryVirtualMemory,7_2_05232CC0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05232F60 NtCreateProcessEx,7_2_05232F60
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05232FA0 NtQuerySection,7_2_05232FA0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05232FB0 NtResumeThread,7_2_05232FB0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05232F90 NtProtectVirtualMemory,7_2_05232F90
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05232E30 NtWriteVirtualMemory,7_2_05232E30
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05232E80 NtReadVirtualMemory,7_2_05232E80
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05232EE0 NtQueueApcThread,7_2_05232EE0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05232BA0 NtEnumerateValueKey,7_2_05232BA0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05232B80 NtQueryInformationFile,7_2_05232B80
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05232AB0 NtWaitForSingleObject,7_2_05232AB0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05232AF0 NtWriteFile,7_2_05232AF0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05233010 NtOpenDirectoryObject,7_2_05233010
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05233090 NtSetValueKey,7_2_05233090
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05233D10 NtOpenProcessToken,7_2_05233D10
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05233D70 NtOpenThread,7_2_05233D70
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052339B0 NtGetContextThread,7_2_052339B0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0329A360 NtCreateFile,7_2_0329A360
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0329A540 NtAllocateVirtualMemory,7_2_0329A540
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0329A410 NtReadFile,7_2_0329A410
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0329A490 NtClose,7_2_0329A490
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0329A35A NtCreateFile,7_2_0329A35A
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0329A40A NtReadFile,7_2_0329A40A
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_050CA036 NtQueryInformationProcess,NtSuspendThread,NtSetContextThread,RtlQueueApcWow64Thread,NtResumeThread,7_2_050CA036
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_050C9BAF NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtUnmapViewOfSection,NtClose,7_2_050C9BAF
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_050CA042 NtQueryInformationProcess,7_2_050CA042
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_050C9BB2 NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,7_2_050C9BB2
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 0_2_012210580_2_01221058
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 0_2_012255D80_2_012255D8
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 0_2_01224B800_2_01224B80
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 0_2_012255C80_2_012255C8
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 0_2_012234710_2_01223471
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 0_2_012237A00_2_012237A0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 0_2_012237900_2_01223790
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 0_2_01224B700_2_01224B70
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 0_2_01220FB60_2_01220FB6
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 0_2_053444540_2_05344454
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 0_2_053441A40_2_053441A4
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 0_2_05346D710_2_05346D71
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 0_2_053451B00_2_053451B0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 0_2_053451C00_2_053451C0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 0_2_05388C5B0_2_05388C5B
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 0_2_05388C800_2_05388C80
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 0_2_0A2A46700_2_0A2A4670
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 0_2_0A2A5E580_2_0A2A5E58
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_004010304_2_00401030
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_00402D874_2_00402D87
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_00402D904_2_00402D90
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0041EDAD4_2_0041EDAD
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_00409E604_2_00409E60
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0041D7A04_2_0041D7A0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_00402FB04_2_00402FB0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E01004_2_011E0100
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0128A1184_2_0128A118
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012781584_2_01278158
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012B01AA4_2_012B01AA
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012A41A24_2_012A41A2
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012A81CC4_2_012A81CC
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012820004_2_01282000
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012AA3524_2_012AA352
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012B03E64_2_012B03E6
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011FE3F04_2_011FE3F0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012902744_2_01290274
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012702C04_2_012702C0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F05354_2_011F0535
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012B05914_2_012B0591
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012944204_2_01294420
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012A24464_2_012A2446
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0129E4F64_2_0129E4F6
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F07704_2_011F0770
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012147504_2_01214750
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011EC7C04_2_011EC7C0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0120C6E04_2_0120C6E0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012069624_2_01206962
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012BA9A64_2_012BA9A6
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F29A04_2_011F29A0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F28404_2_011F2840
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011FA8404_2_011FA840
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011D68B84_2_011D68B8
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121E8F04_2_0121E8F0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012AAB404_2_012AAB40
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012A6BD74_2_012A6BD7
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011EEA804_2_011EEA80
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011FAD004_2_011FAD00
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0128CD1F4_2_0128CD1F
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01208DBF4_2_01208DBF
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011EADE04_2_011EADE0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F0C004_2_011F0C00
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01290CB54_2_01290CB5
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E0CF24_2_011E0CF2
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01232F284_2_01232F28
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01210F304_2_01210F30
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01292F304_2_01292F30
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01264F404_2_01264F40
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0126EFA04_2_0126EFA0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E2FC84_2_011E2FC8
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011FCFE04_2_011FCFE0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012AEE264_2_012AEE26
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F0E594_2_011F0E59
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01202E904_2_01202E90
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012ACE934_2_012ACE93
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012AEEDB4_2_012AEEDB
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012BB16B4_2_012BB16B
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0122516C4_2_0122516C
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011DF1724_2_011DF172
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011FB1B04_2_011FB1B0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012A70E94_2_012A70E9
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012AF0E04_2_012AF0E0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F70C04_2_011F70C0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0129F0CC4_2_0129F0CC
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012A132D4_2_012A132D
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011DD34C4_2_011DD34C
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0123739A4_2_0123739A
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F52A04_2_011F52A0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012912ED4_2_012912ED
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0120B2C04_2_0120B2C0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012A75714_2_012A7571
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0128D5B04_2_0128D5B0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012B95C34_2_012B95C3
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012AF43F4_2_012AF43F
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E14604_2_011E1460
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012AF7B04_2_012AF7B0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012356304_2_01235630
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012A16CC4_2_012A16CC
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012859104_2_01285910
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F99504_2_011F9950
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0120B9504_2_0120B950
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0125D8004_2_0125D800
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F38E04_2_011F38E0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012AFB764_2_012AFB76
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0120FB804_2_0120FB80
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01265BF04_2_01265BF0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0122DBF94_2_0122DBF9
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01263A6C4_2_01263A6C
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012AFA494_2_012AFA49
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012A7A464_2_012A7A46
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01235AA04_2_01235AA0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0128DAAC4_2_0128DAAC
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01291AA34_2_01291AA3
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0129DAC64_2_0129DAC6
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012A7D734_2_012A7D73
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F3D404_2_011F3D40
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012A1D5A4_2_012A1D5A
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0120FDC04_2_0120FDC0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01269C324_2_01269C32
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012AFCF24_2_012AFCF2
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012AFF094_2_012AFF09
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F1F924_2_011F1F92
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012AFFB14_2_012AFFB1
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F9EB04_2_011F9EB0
          Source: C:\Windows\explorer.exeCode function: 6_2_10A510826_2_10A51082
          Source: C:\Windows\explorer.exeCode function: 6_2_10A5A0366_2_10A5A036
          Source: C:\Windows\explorer.exeCode function: 6_2_10A5E5CD6_2_10A5E5CD
          Source: C:\Windows\explorer.exeCode function: 6_2_10A52D026_2_10A52D02
          Source: C:\Windows\explorer.exeCode function: 6_2_10A589126_2_10A58912
          Source: C:\Windows\explorer.exeCode function: 6_2_10A5B2326_2_10A5B232
          Source: C:\Windows\explorer.exeCode function: 6_2_10A55B306_2_10A55B30
          Source: C:\Windows\explorer.exeCode function: 6_2_10A55B326_2_10A55B32
          Source: C:\Windows\explorer.exeCode function: 6_2_1158F2326_2_1158F232
          Source: C:\Windows\explorer.exeCode function: 6_2_1158C9126_2_1158C912
          Source: C:\Windows\explorer.exeCode function: 6_2_11586D026_2_11586D02
          Source: C:\Windows\explorer.exeCode function: 6_2_11589B306_2_11589B30
          Source: C:\Windows\explorer.exeCode function: 6_2_11589B326_2_11589B32
          Source: C:\Windows\explorer.exeCode function: 6_2_115925CD6_2_115925CD
          Source: C:\Windows\explorer.exeCode function: 6_2_1158E0366_2_1158E036
          Source: C:\Windows\explorer.exeCode function: 6_2_115850826_2_11585082
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052005357_2_05200535
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052C05917_2_052C0591
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052A44207_2_052A4420
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052B24467_2_052B2446
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052AE4F67_2_052AE4F6
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052007707_2_05200770
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052247507_2_05224750
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_051FC7C07_2_051FC7C0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0521C6E07_2_0521C6E0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_051F01007_2_051F0100
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0529A1187_2_0529A118
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052881587_2_05288158
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052C01AA7_2_052C01AA
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052B41A27_2_052B41A2
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052B81CC7_2_052B81CC
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052920007_2_05292000
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052BA3527_2_052BA352
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052C03E67_2_052C03E6
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0520E3F07_2_0520E3F0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052A02747_2_052A0274
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052802C07_2_052802C0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0520AD007_2_0520AD00
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0529CD1F7_2_0529CD1F
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05218DBF7_2_05218DBF
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_051FADE07_2_051FADE0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05200C007_2_05200C00
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052A0CB57_2_052A0CB5
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_051F0CF27_2_051F0CF2
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05242F287_2_05242F28
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05220F307_2_05220F30
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052A2F307_2_052A2F30
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05274F407_2_05274F40
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0527EFA07_2_0527EFA0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0520CFE07_2_0520CFE0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_051F2FC87_2_051F2FC8
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052BEE267_2_052BEE26
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05200E597_2_05200E59
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05212E907_2_05212E90
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052BCE937_2_052BCE93
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052BEEDB7_2_052BEEDB
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052169627_2_05216962
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052029A07_2_052029A0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052CA9A67_2_052CA9A6
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0520A8407_2_0520A840
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052028407_2_05202840
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_051E68B87_2_051E68B8
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0522E8F07_2_0522E8F0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052BAB407_2_052BAB40
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052B6BD77_2_052B6BD7
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_051FEA807_2_051FEA80
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052B75717_2_052B7571
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0529D5B07_2_0529D5B0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052C95C37_2_052C95C3
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052BF43F7_2_052BF43F
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_051F14607_2_051F1460
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052BF7B07_2_052BF7B0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052456307_2_05245630
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052B16CC7_2_052B16CC
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052CB16B7_2_052CB16B
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0523516C7_2_0523516C
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_051EF1727_2_051EF172
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0520B1B07_2_0520B1B0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052B70E97_2_052B70E9
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052BF0E07_2_052BF0E0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052070C07_2_052070C0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052AF0CC7_2_052AF0CC
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052B132D7_2_052B132D
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_051ED34C7_2_051ED34C
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0524739A7_2_0524739A
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052052A07_2_052052A0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052A12ED7_2_052A12ED
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0521B2C07_2_0521B2C0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052B7D737_2_052B7D73
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05203D407_2_05203D40
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052B1D5A7_2_052B1D5A
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0521FDC07_2_0521FDC0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05279C327_2_05279C32
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052BFCF27_2_052BFCF2
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052BFF097_2_052BFF09
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052BFFB17_2_052BFFB1
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05201F927_2_05201F92
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_051C3FD57_2_051C3FD5
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_051C3FD27_2_051C3FD2
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05209EB07_2_05209EB0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052959107_2_05295910
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052099507_2_05209950
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0521B9507_2_0521B950
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0526D8007_2_0526D800
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052038E07_2_052038E0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052BFB767_2_052BFB76
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0521FB807_2_0521FB80
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05275BF07_2_05275BF0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0523DBF97_2_0523DBF9
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05273A6C7_2_05273A6C
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052BFA497_2_052BFA49
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052B7A467_2_052B7A46
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_05245AA07_2_05245AA0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0529DAAC7_2_0529DAAC
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052A1AA37_2_052A1AA3
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_052ADAC67_2_052ADAC6
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_03282FB07_2_03282FB0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_03289E607_2_03289E60
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0329EDAD7_2_0329EDAD
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_03282D877_2_03282D87
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_03282D907_2_03282D90
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_050CA0367_2_050CA036
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_050C2D027_2_050C2D02
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_050CE5CD7_2_050CE5CD
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_050C89127_2_050C8912
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_050C10827_2_050C1082
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_050C5B307_2_050C5B30
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_050C5B327_2_050C5B32
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_050CB2327_2_050CB232
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: String function: 01225130 appears 58 times
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: String function: 0125EA12 appears 86 times
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: String function: 011DB970 appears 280 times
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: String function: 01237E54 appears 111 times
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: String function: 0126F290 appears 105 times
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: String function: 0526EA12 appears 86 times
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: String function: 0527F290 appears 105 times
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: String function: 051EB970 appears 280 times
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: String function: 05247E54 appears 111 times
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: String function: 05235130 appears 58 times
          Source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe, 00000000.00000002.2163845733.0000000002EA4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFGMaker.dll2 vs Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe
          Source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe, 00000000.00000002.2171913312.00000000048BA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe
          Source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe, 00000000.00000002.2175662094.0000000007D80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe
          Source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe, 00000000.00000002.2160311993.000000000124E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe
          Source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe, 00000000.00000002.2179265465.000000000D470000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameFGMaker.dll2 vs Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe
          Source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe, 00000000.00000000.2099848272.0000000000A82000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamebiRh.exeF vs Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe
          Source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe, 00000004.00000002.2231174141.00000000015A3000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamecolorcpl.exej% vs Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe
          Source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe, 00000004.00000002.2228754932.0000000000D58000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamecolorcpl.exej% vs Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe
          Source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe, 00000004.00000002.2229987491.00000000012DD000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe
          Source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeBinary or memory string: OriginalFilenamebiRh.exeF vs Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe
          Source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 4.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 4.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 4.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 4.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 4.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 4.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000007.00000002.3351494869.0000000003650000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000007.00000002.3351494869.0000000003650000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000007.00000002.3351494869.0000000003650000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000006.00000002.3376444530.00000000115A7000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_772cc62d os = windows, severity = x86, creation_date = 2022-05-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8343b5d02d74791ba2d5d52d19a759f761de2b5470d935000bc27ea6c0633f5, id = 772cc62d-345c-42d8-97ab-f67e447ddca4, last_modified = 2022-07-18
          Source: 00000004.00000002.2227875031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000004.00000002.2227875031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000002.2227875031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.2171913312.00000000048BA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000000.00000002.2171913312.00000000048BA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.2171913312.00000000048BA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000007.00000002.3349619553.0000000003520000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000007.00000002.3349619553.0000000003520000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000007.00000002.3349619553.0000000003520000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: Process Memory Space: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe PID: 5920, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe PID: 1364, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: explorer.exe PID: 4004, type: MEMORYSTRMatched rule: ironshell_php author = Neo23x0 Yara BRG + customization by Stefan -dfate- Molls, description = Semi-Auto-generated - file ironshell.php.txt, hash = 8bfa2eeb8a3ff6afc619258e39fded56
          Source: Process Memory Space: colorcpl.exe PID: 2820, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, GXx0SGmTOiRtn7taWO.csSecurity API names: _0020.SetAccessControl
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, GXx0SGmTOiRtn7taWO.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, GXx0SGmTOiRtn7taWO.csSecurity API names: _0020.AddAccessRule
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, GXx0SGmTOiRtn7taWO.csSecurity API names: _0020.SetAccessControl
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, GXx0SGmTOiRtn7taWO.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, GXx0SGmTOiRtn7taWO.csSecurity API names: _0020.AddAccessRule
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.7d80000.4.raw.unpack, ttLDUujofieHjDbfiY.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, ttLDUujofieHjDbfiY.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.7d80000.4.raw.unpack, GXx0SGmTOiRtn7taWO.csSecurity API names: _0020.SetAccessControl
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.7d80000.4.raw.unpack, GXx0SGmTOiRtn7taWO.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.7d80000.4.raw.unpack, GXx0SGmTOiRtn7taWO.csSecurity API names: _0020.AddAccessRule
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, ttLDUujofieHjDbfiY.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: classification engineClassification label: mal100.troj.evad.winEXE@11/6@6/3
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.logJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2324:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5208:120:WilError_03
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yqurixrq.wpr.ps1Jump to behavior
          Source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeReversingLabs: Detection: 58%
          Source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeVirustotal: Detection: 53%
          Source: unknownProcess created: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe "C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe"
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe"
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess created: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe "C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe"
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\colorcpl.exe "C:\Windows\SysWOW64\colorcpl.exe"
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe"Jump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess created: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe "C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe"Jump to behavior
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\colorcpl.exe "C:\Windows\SysWOW64\colorcpl.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe"Jump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: dwrite.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: windowscodecs.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: slc.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: windows.cloudstore.schema.shell.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: vcruntime140_1.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: msvcp140.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dllJump to behavior
          Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: colorui.dllJump to behavior
          Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: mscms.dllJump to behavior
          Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: coloradapterclient.dllJump to behavior
          Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: colorcpl.pdbGCTL source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe, 00000004.00000002.2231174141.00000000015A0000.00000040.10000000.00040000.00000000.sdmp, Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe, 00000004.00000002.2228754932.0000000000D58000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000007.00000002.3346631053.00000000008F0000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: colorcpl.pdb source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe, 00000004.00000002.2231174141.00000000015A0000.00000040.10000000.00040000.00000000.sdmp, Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe, 00000004.00000002.2228754932.0000000000D58000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, colorcpl.exe, 00000007.00000002.3346631053.00000000008F0000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe, 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, colorcpl.exe, 00000007.00000002.3357917667.00000000051C0000.00000040.00001000.00020000.00000000.sdmp, colorcpl.exe, 00000007.00000003.2228323315.0000000004E5C000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000007.00000003.2231435212.000000000500B000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000007.00000002.3357917667.000000000535E000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe, Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe, 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, colorcpl.exe, colorcpl.exe, 00000007.00000002.3357917667.00000000051C0000.00000040.00001000.00020000.00000000.sdmp, colorcpl.exe, 00000007.00000003.2228323315.0000000004E5C000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000007.00000003.2231435212.000000000500B000.00000004.00000020.00020000.00000000.sdmp, colorcpl.exe, 00000007.00000002.3357917667.000000000535E000.00000040.00001000.00020000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.2ee18c8.0.raw.unpack, bg.cs.Net Code: System.Reflection.Assembly.Load(byte[])
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.7d80000.4.raw.unpack, GXx0SGmTOiRtn7taWO.cs.Net Code: Uppc4PVdBa System.Reflection.Assembly.Load(byte[])
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, GXx0SGmTOiRtn7taWO.cs.Net Code: Uppc4PVdBa System.Reflection.Assembly.Load(byte[])
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.d470000.6.raw.unpack, bg.cs.Net Code: System.Reflection.Assembly.Load(byte[])
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, GXx0SGmTOiRtn7taWO.cs.Net Code: Uppc4PVdBa System.Reflection.Assembly.Load(byte[])
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 0_2_0D494D30 push ds; iretd 0_2_0D494D32
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 0_2_0D491CD2 pushad ; retf 0_2_0D491CDD
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 0_2_012233D3 push ss; iretd 0_2_012233D4
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 0_2_05344B60 pushfd ; iretd 0_2_05344B61
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 0_2_05343E88 push esp; retf 0_2_05343E89
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 0_2_0A2A4660 pushad ; iretd 0_2_0A2A4669
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0040E33E pushfd ; retf 4_2_0040E3A2
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0040E39D pushfd ; retf 4_2_0040E3A2
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0040E440 push FFFFFF8Bh; ret 4_2_0040E45E
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0041D4B5 push eax; ret 4_2_0041D508
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0041D56C push eax; ret 4_2_0041D572
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0041D502 push eax; ret 4_2_0041D508
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0041D50B push eax; ret 4_2_0041D572
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E09AD push ecx; mov dword ptr [esp], ecx4_2_011E09B6
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011B1366 push eax; iretd 4_2_011B1369
          Source: C:\Windows\explorer.exeCode function: 6_2_10A5E9B5 push esp; retn 0000h6_2_10A5EAE7
          Source: C:\Windows\explorer.exeCode function: 6_2_10A5EB02 push esp; retn 0000h6_2_10A5EB03
          Source: C:\Windows\explorer.exeCode function: 6_2_10A5EB1E push esp; retn 0000h6_2_10A5EB1F
          Source: C:\Windows\explorer.exeCode function: 6_2_11592B1E push esp; retn 0000h6_2_11592B1F
          Source: C:\Windows\explorer.exeCode function: 6_2_11592B02 push esp; retn 0000h6_2_11592B03
          Source: C:\Windows\explorer.exeCode function: 6_2_115929B5 push esp; retn 0000h6_2_11592AE7
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_008F1A6D push ecx; ret 7_2_008F1A80
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_051C27FA pushad ; ret 7_2_051C27F9
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_051C225F pushad ; ret 7_2_051C27F9
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_051F09AD push ecx; mov dword ptr [esp], ecx7_2_051F09B6
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_051C283D push eax; iretd 7_2_051C2858
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0328E33E pushfd ; retf 7_2_0328E3A2
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0328E39D pushfd ; retf 7_2_0328E3A2
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0329D50B push eax; ret 7_2_0329D572
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0329D502 push eax; ret 7_2_0329D508
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0329D56C push eax; ret 7_2_0329D572
          Source: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeStatic PE information: section name: .text entropy: 7.8646973020800965
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.7d80000.4.raw.unpack, O9FANg0bt2GobvTVrX.csHigh entropy of concatenated method names: 'x21oqUIj7P', 'KIuovP410N', 'bdIbZm1Tls', 'Busbne4bmw', 'cS5bYY91Tn', 'FL9bRJSGdK', 'wnsbgpkFGY', 'tbfb3AXLDM', 'UUdbW47ioX', 'XvRb7hyS6A'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.7d80000.4.raw.unpack, TTl4eHddUhvBjBIjsO9.csHigh entropy of concatenated method names: 'ToString', 'Rr3V27U4wE', 'aQSVclX3nq', 'dwGVGihWQv', 'vdTVIl1hND', 'XNpVk6dDKE', 'l5vVbtRnH9', 'NYJVo6Sijy', 'pdFS3HGoZYw7PTMmH0e', 'xqaA4NGvLGEC0qhMdxv'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.7d80000.4.raw.unpack, tND9U1NKeBju5NUoAJ.csHigh entropy of concatenated method names: 'nCgQjrwXvd', 'tbbQ59M3w0', 'tYYQEFlESC', 'b0FQuJ3W2T', 'hgAQnxgwJd', 'tBOQYBWQPG', 'RDqQgy07XB', 'j61Q3euwwH', 'C8xQ7qaQ4R', 'DYTQ1qbAwY'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.7d80000.4.raw.unpack, ttLDUujofieHjDbfiY.csHigh entropy of concatenated method names: 'wCdk8udWbu', 'P8dkeRhYRY', 'G7jkSYF98D', 'EPZk9KPruu', 'cV2kylRG9h', 'cUTka45cuZ', 'revks9kF1r', 'BQXkrefGnk', 'VKEkCghObV', 'nBAkUiFcXq'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.7d80000.4.raw.unpack, S99sKCwkUgfjFW1F2E.csHigh entropy of concatenated method names: 'G1H4mcTUF', 'UqFplSk41', 'jCE6meMxc', 'p7hvkNvYZ', 'TBD5nBKf3', 'Jvr0ZnOhh', 'klaPATth1HglNFA8R1', 'aWZSDCycKmhj4U6mEe', 'NKrAhiWQd', 'VA5VcIfDQ'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.7d80000.4.raw.unpack, m17wl5gyXIYxEphQSi.csHigh entropy of concatenated method names: 'gWTPISNSk4', 'VpoPbxEfRF', 'yymPLpq1W4', 'uSHLUIob6I', 'TVGLzyfpcQ', 'OvdPijsr3C', 'F10PduiwUn', 'YV3PwhE3iO', 'cI9P2aLFDP', 'XSaPcWLeaM'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.7d80000.4.raw.unpack, N51F8eS7M336gjuOQe.csHigh entropy of concatenated method names: 'ToString', 'JNtf1RXoC7', 'JFYfuRfuN2', 'ywQfZF8FIc', 'QLvfnXxIAV', 'cWEfYCuWAt', 'uE6fR4ISs6', 'ferfgHfhfG', 'Phff3i98RG', 'WU1fWpCxae'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.7d80000.4.raw.unpack, RGkZwXd2QKZGKicuqrN.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'T5mV8GjvLq', 'Y0UVeVa5B9', 'XnLVSfWMSQ', 'FPEV9HeRaI', 'UJNVycO8xo', 'WZpVa03LHb', 'MfJVsMtiRj'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.7d80000.4.raw.unpack, CQI3QdEcGdnwovGMHe.csHigh entropy of concatenated method names: 'SrnLGqhse1', 'PgJLkAgjvk', 'BbKLo4BVCU', 'PGuLPoik4j', 'U1aLmf6o0H', 't3CoyGkJNg', 'MuGoa8cxK1', 'p5xosBIJMG', 'DLdordTYRJ', 'NeDoC03wIm'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.7d80000.4.raw.unpack, YctVRKUxpHKimVh9oZ.csHigh entropy of concatenated method names: 'itJXdmsVfl', 'adTX2cU5a7', 'hdtXc8d89y', 'TZgXIUcr1K', 'rYgXkKI1I5', 'jv8XoYTIBm', 'y9tXLsaOFM', 'QBHAs2J0MZ', 'uTYArRcyd0', 'faaACgYwHQ'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.7d80000.4.raw.unpack, Opxb7eaP868xKQGrG7.csHigh entropy of concatenated method names: 'G79trVATuZ', 'eyrtU8vZqd', 'gM3Ai2axW4', 'sDpAdmX2O1', 'TPNt1yp3uV', 'jMkthkhkWA', 'RGetNGDrBD', 'NXjt8MM9n0', 'iHCteKH0dV', 'VmptSKmT1B'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.7d80000.4.raw.unpack, rq1BUr5VZZXD0uE869.csHigh entropy of concatenated method names: 'rvxbpOnGBp', 'G1nb6ogWqk', 'koFbj1wVAb', 'V9Eb5dvfxe', 'NgEbJbKmsF', 'nvXbfwpXBi', 'LxFbtKa1L0', 'pxTbAc1gHZ', 'Pv3bXvCEMS', 'JeAbVb30FY'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.7d80000.4.raw.unpack, txwAHy8Uubv9bs8qMA.csHigh entropy of concatenated method names: 'TCIJ7EesbB', 'kEeJhiSiPk', 'hADJ8F1Jf5', 'SMRJeDniAI', 'XXnJunkO9V', 'zmHJZeqcBS', 'LEfJn3qPjN', 'XvVJYMekbi', 'iodJRj3Tau', 'XfQJg0y8vv'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.7d80000.4.raw.unpack, Ojee41CAUtxnDk0HO8.csHigh entropy of concatenated method names: 'MlRAEK1uLA', 'LOcAuQ7mde', 'NYmAZcDewj', 'vJLAnLigkx', 'UKDA80PHJk', 'BrwAYVbElr', 'Next', 'Next', 'Next', 'NextBytes'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.7d80000.4.raw.unpack, OIoygQdidwRtww3HMue.csHigh entropy of concatenated method names: 'zFoXxA6LtK', 'uDPXHXCyEo', 'cqYX4A1CeS', 'QbyXppbyju', 'YiOXqbhjqK', 'gknX6b331s', 'BkKXvE5uiC', 'YSnXjWf0wE', 'aMxX5HNyGu', 'FJ6X0rxIqj'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.7d80000.4.raw.unpack, R5ylPsziDFFfkUvxkJ.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'jp6XQf6hHg', 'CG9XJ7JrjL', 'AC4Xfuhk1a', 'ekoXthpCc5', 'D0WXA8OrJa', 'Jx1XXZuRlU', 'D3OXVckoVM'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.7d80000.4.raw.unpack, xYPAYSraJMMNXUsLYd.csHigh entropy of concatenated method names: 'fxYAIrEefT', 'N4yAkUxAje', 'ERrAbHoPsO', 'UAcAoGw4ss', 'LCbALLocGW', 'OsPAPdXjyq', 'MnBAmX5mOu', 'rIhAFZc4St', 'K9gATmEdJd', 'dnBAMGR6GJ'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.7d80000.4.raw.unpack, mGYi92W6vWKXwwGZUR.csHigh entropy of concatenated method names: 'UgoPx5agkw', 'XcLPHOPD4I', 'y5AP4MeR1U', 'WdrPpVvpUf', 'zU8PqyG0LT', 'P3GP6VgJor', 'A6BPvFiQG9', 'S8LPjP1Iyi', 'MFdP51PGy9', 'G8yP0jOBVU'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.7d80000.4.raw.unpack, GXx0SGmTOiRtn7taWO.csHigh entropy of concatenated method names: 'FaF2GPawdM', 'Urq2IyImfT', 'o412kNe4nF', 'Fcg2bQALh1', 'm982oQ9Ujm', 'DAN2LiKnjT', 'DlR2PVmecT', 'H0d2mBaJM7', 'uua2FEAs4X', 'CfJ2TpOv1F'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.7d80000.4.raw.unpack, AInQANcBZDOFBXnowL.csHigh entropy of concatenated method names: 'kvVdPtLDUu', 'ifidmeHjDb', 'WVZdTZXD0u', 'G86dM979FA', 'CTVdJrXvQI', 'LQddfcGdnw', 'A99hkL0VWNn21TcMji', 'jno0dHMjpvHNr3MNRB', 'l9XddVRc9E', 'QXZd2Dv5I5'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.7d80000.4.raw.unpack, o7K34QkyJitaHU4ZWf.csHigh entropy of concatenated method names: 'Dispose', 'sZhdCvBK5i', 'J9Nwu1qJtZ', 'iw5772Uwhs', 'KxYdUPAYSa', 'oMMdzNXUsL', 'ProcessDialogKey', 'Jd7wijee41', 'rUtwdxnDk0', 'yO8wwUctVR'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, O9FANg0bt2GobvTVrX.csHigh entropy of concatenated method names: 'x21oqUIj7P', 'KIuovP410N', 'bdIbZm1Tls', 'Busbne4bmw', 'cS5bYY91Tn', 'FL9bRJSGdK', 'wnsbgpkFGY', 'tbfb3AXLDM', 'UUdbW47ioX', 'XvRb7hyS6A'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, TTl4eHddUhvBjBIjsO9.csHigh entropy of concatenated method names: 'ToString', 'Rr3V27U4wE', 'aQSVclX3nq', 'dwGVGihWQv', 'vdTVIl1hND', 'XNpVk6dDKE', 'l5vVbtRnH9', 'NYJVo6Sijy', 'pdFS3HGoZYw7PTMmH0e', 'xqaA4NGvLGEC0qhMdxv'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, tND9U1NKeBju5NUoAJ.csHigh entropy of concatenated method names: 'nCgQjrwXvd', 'tbbQ59M3w0', 'tYYQEFlESC', 'b0FQuJ3W2T', 'hgAQnxgwJd', 'tBOQYBWQPG', 'RDqQgy07XB', 'j61Q3euwwH', 'C8xQ7qaQ4R', 'DYTQ1qbAwY'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, ttLDUujofieHjDbfiY.csHigh entropy of concatenated method names: 'wCdk8udWbu', 'P8dkeRhYRY', 'G7jkSYF98D', 'EPZk9KPruu', 'cV2kylRG9h', 'cUTka45cuZ', 'revks9kF1r', 'BQXkrefGnk', 'VKEkCghObV', 'nBAkUiFcXq'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, S99sKCwkUgfjFW1F2E.csHigh entropy of concatenated method names: 'G1H4mcTUF', 'UqFplSk41', 'jCE6meMxc', 'p7hvkNvYZ', 'TBD5nBKf3', 'Jvr0ZnOhh', 'klaPATth1HglNFA8R1', 'aWZSDCycKmhj4U6mEe', 'NKrAhiWQd', 'VA5VcIfDQ'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, m17wl5gyXIYxEphQSi.csHigh entropy of concatenated method names: 'gWTPISNSk4', 'VpoPbxEfRF', 'yymPLpq1W4', 'uSHLUIob6I', 'TVGLzyfpcQ', 'OvdPijsr3C', 'F10PduiwUn', 'YV3PwhE3iO', 'cI9P2aLFDP', 'XSaPcWLeaM'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, N51F8eS7M336gjuOQe.csHigh entropy of concatenated method names: 'ToString', 'JNtf1RXoC7', 'JFYfuRfuN2', 'ywQfZF8FIc', 'QLvfnXxIAV', 'cWEfYCuWAt', 'uE6fR4ISs6', 'ferfgHfhfG', 'Phff3i98RG', 'WU1fWpCxae'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, RGkZwXd2QKZGKicuqrN.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'T5mV8GjvLq', 'Y0UVeVa5B9', 'XnLVSfWMSQ', 'FPEV9HeRaI', 'UJNVycO8xo', 'WZpVa03LHb', 'MfJVsMtiRj'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, CQI3QdEcGdnwovGMHe.csHigh entropy of concatenated method names: 'SrnLGqhse1', 'PgJLkAgjvk', 'BbKLo4BVCU', 'PGuLPoik4j', 'U1aLmf6o0H', 't3CoyGkJNg', 'MuGoa8cxK1', 'p5xosBIJMG', 'DLdordTYRJ', 'NeDoC03wIm'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, YctVRKUxpHKimVh9oZ.csHigh entropy of concatenated method names: 'itJXdmsVfl', 'adTX2cU5a7', 'hdtXc8d89y', 'TZgXIUcr1K', 'rYgXkKI1I5', 'jv8XoYTIBm', 'y9tXLsaOFM', 'QBHAs2J0MZ', 'uTYArRcyd0', 'faaACgYwHQ'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, Opxb7eaP868xKQGrG7.csHigh entropy of concatenated method names: 'G79trVATuZ', 'eyrtU8vZqd', 'gM3Ai2axW4', 'sDpAdmX2O1', 'TPNt1yp3uV', 'jMkthkhkWA', 'RGetNGDrBD', 'NXjt8MM9n0', 'iHCteKH0dV', 'VmptSKmT1B'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, rq1BUr5VZZXD0uE869.csHigh entropy of concatenated method names: 'rvxbpOnGBp', 'G1nb6ogWqk', 'koFbj1wVAb', 'V9Eb5dvfxe', 'NgEbJbKmsF', 'nvXbfwpXBi', 'LxFbtKa1L0', 'pxTbAc1gHZ', 'Pv3bXvCEMS', 'JeAbVb30FY'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, txwAHy8Uubv9bs8qMA.csHigh entropy of concatenated method names: 'TCIJ7EesbB', 'kEeJhiSiPk', 'hADJ8F1Jf5', 'SMRJeDniAI', 'XXnJunkO9V', 'zmHJZeqcBS', 'LEfJn3qPjN', 'XvVJYMekbi', 'iodJRj3Tau', 'XfQJg0y8vv'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, Ojee41CAUtxnDk0HO8.csHigh entropy of concatenated method names: 'MlRAEK1uLA', 'LOcAuQ7mde', 'NYmAZcDewj', 'vJLAnLigkx', 'UKDA80PHJk', 'BrwAYVbElr', 'Next', 'Next', 'Next', 'NextBytes'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, OIoygQdidwRtww3HMue.csHigh entropy of concatenated method names: 'zFoXxA6LtK', 'uDPXHXCyEo', 'cqYX4A1CeS', 'QbyXppbyju', 'YiOXqbhjqK', 'gknX6b331s', 'BkKXvE5uiC', 'YSnXjWf0wE', 'aMxX5HNyGu', 'FJ6X0rxIqj'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, R5ylPsziDFFfkUvxkJ.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'jp6XQf6hHg', 'CG9XJ7JrjL', 'AC4Xfuhk1a', 'ekoXthpCc5', 'D0WXA8OrJa', 'Jx1XXZuRlU', 'D3OXVckoVM'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, xYPAYSraJMMNXUsLYd.csHigh entropy of concatenated method names: 'fxYAIrEefT', 'N4yAkUxAje', 'ERrAbHoPsO', 'UAcAoGw4ss', 'LCbALLocGW', 'OsPAPdXjyq', 'MnBAmX5mOu', 'rIhAFZc4St', 'K9gATmEdJd', 'dnBAMGR6GJ'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, mGYi92W6vWKXwwGZUR.csHigh entropy of concatenated method names: 'UgoPx5agkw', 'XcLPHOPD4I', 'y5AP4MeR1U', 'WdrPpVvpUf', 'zU8PqyG0LT', 'P3GP6VgJor', 'A6BPvFiQG9', 'S8LPjP1Iyi', 'MFdP51PGy9', 'G8yP0jOBVU'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, GXx0SGmTOiRtn7taWO.csHigh entropy of concatenated method names: 'FaF2GPawdM', 'Urq2IyImfT', 'o412kNe4nF', 'Fcg2bQALh1', 'm982oQ9Ujm', 'DAN2LiKnjT', 'DlR2PVmecT', 'H0d2mBaJM7', 'uua2FEAs4X', 'CfJ2TpOv1F'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, AInQANcBZDOFBXnowL.csHigh entropy of concatenated method names: 'kvVdPtLDUu', 'ifidmeHjDb', 'WVZdTZXD0u', 'G86dM979FA', 'CTVdJrXvQI', 'LQddfcGdnw', 'A99hkL0VWNn21TcMji', 'jno0dHMjpvHNr3MNRB', 'l9XddVRc9E', 'QXZd2Dv5I5'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, o7K34QkyJitaHU4ZWf.csHigh entropy of concatenated method names: 'Dispose', 'sZhdCvBK5i', 'J9Nwu1qJtZ', 'iw5772Uwhs', 'KxYdUPAYSa', 'oMMdzNXUsL', 'ProcessDialogKey', 'Jd7wijee41', 'rUtwdxnDk0', 'yO8wwUctVR'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, O9FANg0bt2GobvTVrX.csHigh entropy of concatenated method names: 'x21oqUIj7P', 'KIuovP410N', 'bdIbZm1Tls', 'Busbne4bmw', 'cS5bYY91Tn', 'FL9bRJSGdK', 'wnsbgpkFGY', 'tbfb3AXLDM', 'UUdbW47ioX', 'XvRb7hyS6A'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, TTl4eHddUhvBjBIjsO9.csHigh entropy of concatenated method names: 'ToString', 'Rr3V27U4wE', 'aQSVclX3nq', 'dwGVGihWQv', 'vdTVIl1hND', 'XNpVk6dDKE', 'l5vVbtRnH9', 'NYJVo6Sijy', 'pdFS3HGoZYw7PTMmH0e', 'xqaA4NGvLGEC0qhMdxv'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, tND9U1NKeBju5NUoAJ.csHigh entropy of concatenated method names: 'nCgQjrwXvd', 'tbbQ59M3w0', 'tYYQEFlESC', 'b0FQuJ3W2T', 'hgAQnxgwJd', 'tBOQYBWQPG', 'RDqQgy07XB', 'j61Q3euwwH', 'C8xQ7qaQ4R', 'DYTQ1qbAwY'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, ttLDUujofieHjDbfiY.csHigh entropy of concatenated method names: 'wCdk8udWbu', 'P8dkeRhYRY', 'G7jkSYF98D', 'EPZk9KPruu', 'cV2kylRG9h', 'cUTka45cuZ', 'revks9kF1r', 'BQXkrefGnk', 'VKEkCghObV', 'nBAkUiFcXq'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, S99sKCwkUgfjFW1F2E.csHigh entropy of concatenated method names: 'G1H4mcTUF', 'UqFplSk41', 'jCE6meMxc', 'p7hvkNvYZ', 'TBD5nBKf3', 'Jvr0ZnOhh', 'klaPATth1HglNFA8R1', 'aWZSDCycKmhj4U6mEe', 'NKrAhiWQd', 'VA5VcIfDQ'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, m17wl5gyXIYxEphQSi.csHigh entropy of concatenated method names: 'gWTPISNSk4', 'VpoPbxEfRF', 'yymPLpq1W4', 'uSHLUIob6I', 'TVGLzyfpcQ', 'OvdPijsr3C', 'F10PduiwUn', 'YV3PwhE3iO', 'cI9P2aLFDP', 'XSaPcWLeaM'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, N51F8eS7M336gjuOQe.csHigh entropy of concatenated method names: 'ToString', 'JNtf1RXoC7', 'JFYfuRfuN2', 'ywQfZF8FIc', 'QLvfnXxIAV', 'cWEfYCuWAt', 'uE6fR4ISs6', 'ferfgHfhfG', 'Phff3i98RG', 'WU1fWpCxae'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, RGkZwXd2QKZGKicuqrN.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'T5mV8GjvLq', 'Y0UVeVa5B9', 'XnLVSfWMSQ', 'FPEV9HeRaI', 'UJNVycO8xo', 'WZpVa03LHb', 'MfJVsMtiRj'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, CQI3QdEcGdnwovGMHe.csHigh entropy of concatenated method names: 'SrnLGqhse1', 'PgJLkAgjvk', 'BbKLo4BVCU', 'PGuLPoik4j', 'U1aLmf6o0H', 't3CoyGkJNg', 'MuGoa8cxK1', 'p5xosBIJMG', 'DLdordTYRJ', 'NeDoC03wIm'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, YctVRKUxpHKimVh9oZ.csHigh entropy of concatenated method names: 'itJXdmsVfl', 'adTX2cU5a7', 'hdtXc8d89y', 'TZgXIUcr1K', 'rYgXkKI1I5', 'jv8XoYTIBm', 'y9tXLsaOFM', 'QBHAs2J0MZ', 'uTYArRcyd0', 'faaACgYwHQ'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, Opxb7eaP868xKQGrG7.csHigh entropy of concatenated method names: 'G79trVATuZ', 'eyrtU8vZqd', 'gM3Ai2axW4', 'sDpAdmX2O1', 'TPNt1yp3uV', 'jMkthkhkWA', 'RGetNGDrBD', 'NXjt8MM9n0', 'iHCteKH0dV', 'VmptSKmT1B'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, rq1BUr5VZZXD0uE869.csHigh entropy of concatenated method names: 'rvxbpOnGBp', 'G1nb6ogWqk', 'koFbj1wVAb', 'V9Eb5dvfxe', 'NgEbJbKmsF', 'nvXbfwpXBi', 'LxFbtKa1L0', 'pxTbAc1gHZ', 'Pv3bXvCEMS', 'JeAbVb30FY'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, txwAHy8Uubv9bs8qMA.csHigh entropy of concatenated method names: 'TCIJ7EesbB', 'kEeJhiSiPk', 'hADJ8F1Jf5', 'SMRJeDniAI', 'XXnJunkO9V', 'zmHJZeqcBS', 'LEfJn3qPjN', 'XvVJYMekbi', 'iodJRj3Tau', 'XfQJg0y8vv'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, Ojee41CAUtxnDk0HO8.csHigh entropy of concatenated method names: 'MlRAEK1uLA', 'LOcAuQ7mde', 'NYmAZcDewj', 'vJLAnLigkx', 'UKDA80PHJk', 'BrwAYVbElr', 'Next', 'Next', 'Next', 'NextBytes'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, OIoygQdidwRtww3HMue.csHigh entropy of concatenated method names: 'zFoXxA6LtK', 'uDPXHXCyEo', 'cqYX4A1CeS', 'QbyXppbyju', 'YiOXqbhjqK', 'gknX6b331s', 'BkKXvE5uiC', 'YSnXjWf0wE', 'aMxX5HNyGu', 'FJ6X0rxIqj'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, R5ylPsziDFFfkUvxkJ.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'jp6XQf6hHg', 'CG9XJ7JrjL', 'AC4Xfuhk1a', 'ekoXthpCc5', 'D0WXA8OrJa', 'Jx1XXZuRlU', 'D3OXVckoVM'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, xYPAYSraJMMNXUsLYd.csHigh entropy of concatenated method names: 'fxYAIrEefT', 'N4yAkUxAje', 'ERrAbHoPsO', 'UAcAoGw4ss', 'LCbALLocGW', 'OsPAPdXjyq', 'MnBAmX5mOu', 'rIhAFZc4St', 'K9gATmEdJd', 'dnBAMGR6GJ'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, mGYi92W6vWKXwwGZUR.csHigh entropy of concatenated method names: 'UgoPx5agkw', 'XcLPHOPD4I', 'y5AP4MeR1U', 'WdrPpVvpUf', 'zU8PqyG0LT', 'P3GP6VgJor', 'A6BPvFiQG9', 'S8LPjP1Iyi', 'MFdP51PGy9', 'G8yP0jOBVU'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, GXx0SGmTOiRtn7taWO.csHigh entropy of concatenated method names: 'FaF2GPawdM', 'Urq2IyImfT', 'o412kNe4nF', 'Fcg2bQALh1', 'm982oQ9Ujm', 'DAN2LiKnjT', 'DlR2PVmecT', 'H0d2mBaJM7', 'uua2FEAs4X', 'CfJ2TpOv1F'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, AInQANcBZDOFBXnowL.csHigh entropy of concatenated method names: 'kvVdPtLDUu', 'ifidmeHjDb', 'WVZdTZXD0u', 'G86dM979FA', 'CTVdJrXvQI', 'LQddfcGdnw', 'A99hkL0VWNn21TcMji', 'jno0dHMjpvHNr3MNRB', 'l9XddVRc9E', 'QXZd2Dv5I5'
          Source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, o7K34QkyJitaHU4ZWf.csHigh entropy of concatenated method names: 'Dispose', 'sZhdCvBK5i', 'J9Nwu1qJtZ', 'iw5772Uwhs', 'KxYdUPAYSa', 'oMMdzNXUsL', 'ProcessDialogKey', 'Jd7wijee41', 'rUtwdxnDk0', 'yO8wwUctVR'
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeFile created: \bien nhan thanh toan swift message 38579130 vnd8509509220_pdf.exe
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeFile created: \bien nhan thanh toan swift message 38579130 vnd8509509220_pdf.exe
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeFile created: \bien nhan thanh toan swift message 38579130 vnd8509509220_pdf.exeJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeFile created: \bien nhan thanh toan swift message 38579130 vnd8509509220_pdf.exeJump to behavior

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x82 0x2E 0xE8
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeAPI/Special instruction interceptor: Address: 7FFDB442D324
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeAPI/Special instruction interceptor: Address: 7FFDB4430774
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeAPI/Special instruction interceptor: Address: 7FFDB4430154
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeAPI/Special instruction interceptor: Address: 7FFDB442D8A4
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeAPI/Special instruction interceptor: Address: 7FFDB442DA44
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeAPI/Special instruction interceptor: Address: 7FFDB442D1E4
          Source: C:\Windows\SysWOW64\colorcpl.exeAPI/Special instruction interceptor: Address: 7FFDB442D324
          Source: C:\Windows\SysWOW64\colorcpl.exeAPI/Special instruction interceptor: Address: 7FFDB4430774
          Source: C:\Windows\SysWOW64\colorcpl.exeAPI/Special instruction interceptor: Address: 7FFDB442D944
          Source: C:\Windows\SysWOW64\colorcpl.exeAPI/Special instruction interceptor: Address: 7FFDB442D504
          Source: C:\Windows\SysWOW64\colorcpl.exeAPI/Special instruction interceptor: Address: 7FFDB442D544
          Source: C:\Windows\SysWOW64\colorcpl.exeAPI/Special instruction interceptor: Address: 7FFDB442D1E4
          Source: C:\Windows\SysWOW64\colorcpl.exeAPI/Special instruction interceptor: Address: 7FFDB4430154
          Source: C:\Windows\SysWOW64\colorcpl.exeAPI/Special instruction interceptor: Address: 7FFDB442D8A4
          Source: C:\Windows\SysWOW64\colorcpl.exeAPI/Special instruction interceptor: Address: 7FFDB442DA44
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeRDTSC instruction interceptor: First address: 409904 second address: 40990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeRDTSC instruction interceptor: First address: 409B7E second address: 409B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\colorcpl.exeRDTSC instruction interceptor: First address: 3289904 second address: 328990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\colorcpl.exeRDTSC instruction interceptor: First address: 3289B7E second address: 3289B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeMemory allocated: 11E0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeMemory allocated: 2E80000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeMemory allocated: 2D20000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeMemory allocated: 54B0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeMemory allocated: 64B0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeMemory allocated: 65E0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeMemory allocated: 75E0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeMemory allocated: 7AD0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeMemory allocated: 8AD0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeMemory allocated: 9AD0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeMemory allocated: 54B0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeMemory allocated: 65E0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeMemory allocated: 7E10000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeMemory allocated: 8E10000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeMemory allocated: D4B0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeMemory allocated: 9E10000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_00409AB0 rdtsc 4_2_00409AB0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7828Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1764Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 7023Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 2910Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 889Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 861Jump to behavior
          Source: C:\Windows\SysWOW64\colorcpl.exeWindow / User API: threadDelayed 3257Jump to behavior
          Source: C:\Windows\SysWOW64\colorcpl.exeWindow / User API: threadDelayed 6712Jump to behavior
          Source: C:\Windows\explorer.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_6-13775
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeAPI coverage: 1.6 %
          Source: C:\Windows\SysWOW64\colorcpl.exeAPI coverage: 2.2 %
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe TID: 2852Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7056Thread sleep time: -3689348814741908s >= -30000sJump to behavior
          Source: C:\Windows\explorer.exe TID: 5308Thread sleep count: 7023 > 30Jump to behavior
          Source: C:\Windows\explorer.exe TID: 5308Thread sleep time: -14046000s >= -30000sJump to behavior
          Source: C:\Windows\explorer.exe TID: 5308Thread sleep count: 2910 > 30Jump to behavior
          Source: C:\Windows\explorer.exe TID: 5308Thread sleep time: -5820000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\colorcpl.exe TID: 1908Thread sleep count: 3257 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\colorcpl.exe TID: 1908Thread sleep time: -6514000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\colorcpl.exe TID: 1908Thread sleep count: 6712 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\colorcpl.exe TID: 1908Thread sleep time: -13424000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\colorcpl.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\colorcpl.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: explorer.exe, 00000006.00000000.2173161867.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3365438539.000000000962B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWystem32\DriverStore\en-US\msmouse.inf_locv
          Source: explorer.exe, 00000006.00000000.2174937509.00000000097F3000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
          Source: explorer.exe, 00000006.00000002.3365438539.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2173161867.000000000973C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWws
          Source: explorer.exe, 00000006.00000000.2180275775.000000000C354000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000006.00000002.3366414703.00000000098AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}RoamingCom
          Source: explorer.exe, 00000006.00000000.2173161867.0000000009605000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTVMWare
          Source: explorer.exe, 00000006.00000000.2180275775.000000000C354000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}@
          Source: explorer.exe, 00000006.00000000.2180275775.000000000C354000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}@]
          Source: explorer.exe, 00000006.00000002.3347634724.0000000000D99000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000006.00000000.2173161867.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3365438539.000000000978C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: explorer.exe, 00000006.00000002.3347634724.0000000000D99000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000W
          Source: explorer.exe, 00000006.00000002.3372354136.000000000C377000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: 1efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}@
          Source: explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
          Source: explorer.exe, 00000006.00000002.3366414703.00000000098AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}lnkramW6
          Source: explorer.exe, 00000006.00000002.3347634724.0000000000D99000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
          Source: explorer.exe, 00000006.00000002.3366414703.00000000098AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
          Source: explorer.exe, 00000006.00000002.3347634724.0000000000D99000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess queried: DebugPortJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_00409AB0 rdtsc 4_2_00409AB0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0040ACF0 LdrLoadDll,4_2_0040ACF0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01210124 mov eax, dword ptr fs:[00000030h]4_2_01210124
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0128E10E mov eax, dword ptr fs:[00000030h]4_2_0128E10E
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0128E10E mov ecx, dword ptr fs:[00000030h]4_2_0128E10E
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0128E10E mov eax, dword ptr fs:[00000030h]4_2_0128E10E
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0128E10E mov eax, dword ptr fs:[00000030h]4_2_0128E10E
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0128E10E mov ecx, dword ptr fs:[00000030h]4_2_0128E10E
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0128E10E mov eax, dword ptr fs:[00000030h]4_2_0128E10E
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0128E10E mov eax, dword ptr fs:[00000030h]4_2_0128E10E
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0128E10E mov ecx, dword ptr fs:[00000030h]4_2_0128E10E
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0128E10E mov eax, dword ptr fs:[00000030h]4_2_0128E10E
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0128E10E mov ecx, dword ptr fs:[00000030h]4_2_0128E10E
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0128A118 mov ecx, dword ptr fs:[00000030h]4_2_0128A118
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0128A118 mov eax, dword ptr fs:[00000030h]4_2_0128A118
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0128A118 mov eax, dword ptr fs:[00000030h]4_2_0128A118
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0128A118 mov eax, dword ptr fs:[00000030h]4_2_0128A118
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012A0115 mov eax, dword ptr fs:[00000030h]4_2_012A0115
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E6154 mov eax, dword ptr fs:[00000030h]4_2_011E6154
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E6154 mov eax, dword ptr fs:[00000030h]4_2_011E6154
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011DC156 mov eax, dword ptr fs:[00000030h]4_2_011DC156
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012B4164 mov eax, dword ptr fs:[00000030h]4_2_012B4164
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012B4164 mov eax, dword ptr fs:[00000030h]4_2_012B4164
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01274144 mov eax, dword ptr fs:[00000030h]4_2_01274144
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01274144 mov eax, dword ptr fs:[00000030h]4_2_01274144
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01274144 mov ecx, dword ptr fs:[00000030h]4_2_01274144
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01274144 mov eax, dword ptr fs:[00000030h]4_2_01274144
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01274144 mov eax, dword ptr fs:[00000030h]4_2_01274144
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01278158 mov eax, dword ptr fs:[00000030h]4_2_01278158
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011DA197 mov eax, dword ptr fs:[00000030h]4_2_011DA197
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011DA197 mov eax, dword ptr fs:[00000030h]4_2_011DA197
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011DA197 mov eax, dword ptr fs:[00000030h]4_2_011DA197
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0129C188 mov eax, dword ptr fs:[00000030h]4_2_0129C188
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0129C188 mov eax, dword ptr fs:[00000030h]4_2_0129C188
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01220185 mov eax, dword ptr fs:[00000030h]4_2_01220185
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01284180 mov eax, dword ptr fs:[00000030h]4_2_01284180
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01284180 mov eax, dword ptr fs:[00000030h]4_2_01284180
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0126019F mov eax, dword ptr fs:[00000030h]4_2_0126019F
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0126019F mov eax, dword ptr fs:[00000030h]4_2_0126019F
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0126019F mov eax, dword ptr fs:[00000030h]4_2_0126019F
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0126019F mov eax, dword ptr fs:[00000030h]4_2_0126019F
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012B61E5 mov eax, dword ptr fs:[00000030h]4_2_012B61E5
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012101F8 mov eax, dword ptr fs:[00000030h]4_2_012101F8
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012A61C3 mov eax, dword ptr fs:[00000030h]4_2_012A61C3
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012A61C3 mov eax, dword ptr fs:[00000030h]4_2_012A61C3
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0125E1D0 mov eax, dword ptr fs:[00000030h]4_2_0125E1D0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0125E1D0 mov eax, dword ptr fs:[00000030h]4_2_0125E1D0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0125E1D0 mov ecx, dword ptr fs:[00000030h]4_2_0125E1D0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0125E1D0 mov eax, dword ptr fs:[00000030h]4_2_0125E1D0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0125E1D0 mov eax, dword ptr fs:[00000030h]4_2_0125E1D0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011FE016 mov eax, dword ptr fs:[00000030h]4_2_011FE016
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011FE016 mov eax, dword ptr fs:[00000030h]4_2_011FE016
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011FE016 mov eax, dword ptr fs:[00000030h]4_2_011FE016
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011FE016 mov eax, dword ptr fs:[00000030h]4_2_011FE016
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01276030 mov eax, dword ptr fs:[00000030h]4_2_01276030
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01264000 mov ecx, dword ptr fs:[00000030h]4_2_01264000
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01282000 mov eax, dword ptr fs:[00000030h]4_2_01282000
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01282000 mov eax, dword ptr fs:[00000030h]4_2_01282000
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01282000 mov eax, dword ptr fs:[00000030h]4_2_01282000
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01282000 mov eax, dword ptr fs:[00000030h]4_2_01282000
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01282000 mov eax, dword ptr fs:[00000030h]4_2_01282000
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01282000 mov eax, dword ptr fs:[00000030h]4_2_01282000
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01282000 mov eax, dword ptr fs:[00000030h]4_2_01282000
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01282000 mov eax, dword ptr fs:[00000030h]4_2_01282000
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011DA020 mov eax, dword ptr fs:[00000030h]4_2_011DA020
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011DC020 mov eax, dword ptr fs:[00000030h]4_2_011DC020
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E2050 mov eax, dword ptr fs:[00000030h]4_2_011E2050
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0120C073 mov eax, dword ptr fs:[00000030h]4_2_0120C073
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01266050 mov eax, dword ptr fs:[00000030h]4_2_01266050
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012780A8 mov eax, dword ptr fs:[00000030h]4_2_012780A8
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012A60B8 mov eax, dword ptr fs:[00000030h]4_2_012A60B8
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012A60B8 mov ecx, dword ptr fs:[00000030h]4_2_012A60B8
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E208A mov eax, dword ptr fs:[00000030h]4_2_011E208A
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011D80A0 mov eax, dword ptr fs:[00000030h]4_2_011D80A0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012660E0 mov eax, dword ptr fs:[00000030h]4_2_012660E0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012220F0 mov ecx, dword ptr fs:[00000030h]4_2_012220F0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011DC0F0 mov eax, dword ptr fs:[00000030h]4_2_011DC0F0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E80E9 mov eax, dword ptr fs:[00000030h]4_2_011E80E9
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012620DE mov eax, dword ptr fs:[00000030h]4_2_012620DE
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011DA0E3 mov ecx, dword ptr fs:[00000030h]4_2_011DA0E3
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011DC310 mov ecx, dword ptr fs:[00000030h]4_2_011DC310
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012B8324 mov eax, dword ptr fs:[00000030h]4_2_012B8324
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012B8324 mov ecx, dword ptr fs:[00000030h]4_2_012B8324
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012B8324 mov eax, dword ptr fs:[00000030h]4_2_012B8324
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012B8324 mov eax, dword ptr fs:[00000030h]4_2_012B8324
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121A30B mov eax, dword ptr fs:[00000030h]4_2_0121A30B
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121A30B mov eax, dword ptr fs:[00000030h]4_2_0121A30B
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121A30B mov eax, dword ptr fs:[00000030h]4_2_0121A30B
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01200310 mov ecx, dword ptr fs:[00000030h]4_2_01200310
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0128437C mov eax, dword ptr fs:[00000030h]4_2_0128437C
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012B634F mov eax, dword ptr fs:[00000030h]4_2_012B634F
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01262349 mov eax, dword ptr fs:[00000030h]4_2_01262349
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01262349 mov eax, dword ptr fs:[00000030h]4_2_01262349
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01262349 mov eax, dword ptr fs:[00000030h]4_2_01262349
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01262349 mov eax, dword ptr fs:[00000030h]4_2_01262349
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01262349 mov eax, dword ptr fs:[00000030h]4_2_01262349
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01262349 mov eax, dword ptr fs:[00000030h]4_2_01262349
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01262349 mov eax, dword ptr fs:[00000030h]4_2_01262349
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01262349 mov eax, dword ptr fs:[00000030h]4_2_01262349
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01262349 mov eax, dword ptr fs:[00000030h]4_2_01262349
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01262349 mov eax, dword ptr fs:[00000030h]4_2_01262349
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01262349 mov eax, dword ptr fs:[00000030h]4_2_01262349
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01262349 mov eax, dword ptr fs:[00000030h]4_2_01262349
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01262349 mov eax, dword ptr fs:[00000030h]4_2_01262349
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01262349 mov eax, dword ptr fs:[00000030h]4_2_01262349
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01262349 mov eax, dword ptr fs:[00000030h]4_2_01262349
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012AA352 mov eax, dword ptr fs:[00000030h]4_2_012AA352
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01288350 mov ecx, dword ptr fs:[00000030h]4_2_01288350
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0126035C mov eax, dword ptr fs:[00000030h]4_2_0126035C
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0126035C mov eax, dword ptr fs:[00000030h]4_2_0126035C
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0126035C mov eax, dword ptr fs:[00000030h]4_2_0126035C
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0126035C mov ecx, dword ptr fs:[00000030h]4_2_0126035C
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0126035C mov eax, dword ptr fs:[00000030h]4_2_0126035C
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0126035C mov eax, dword ptr fs:[00000030h]4_2_0126035C
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011D8397 mov eax, dword ptr fs:[00000030h]4_2_011D8397
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011D8397 mov eax, dword ptr fs:[00000030h]4_2_011D8397
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011D8397 mov eax, dword ptr fs:[00000030h]4_2_011D8397
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011DE388 mov eax, dword ptr fs:[00000030h]4_2_011DE388
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011DE388 mov eax, dword ptr fs:[00000030h]4_2_011DE388
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011DE388 mov eax, dword ptr fs:[00000030h]4_2_011DE388
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0120438F mov eax, dword ptr fs:[00000030h]4_2_0120438F
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0120438F mov eax, dword ptr fs:[00000030h]4_2_0120438F
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E83C0 mov eax, dword ptr fs:[00000030h]4_2_011E83C0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E83C0 mov eax, dword ptr fs:[00000030h]4_2_011E83C0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E83C0 mov eax, dword ptr fs:[00000030h]4_2_011E83C0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E83C0 mov eax, dword ptr fs:[00000030h]4_2_011E83C0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011EA3C0 mov eax, dword ptr fs:[00000030h]4_2_011EA3C0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011EA3C0 mov eax, dword ptr fs:[00000030h]4_2_011EA3C0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011EA3C0 mov eax, dword ptr fs:[00000030h]4_2_011EA3C0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011EA3C0 mov eax, dword ptr fs:[00000030h]4_2_011EA3C0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011EA3C0 mov eax, dword ptr fs:[00000030h]4_2_011EA3C0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011EA3C0 mov eax, dword ptr fs:[00000030h]4_2_011EA3C0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012163FF mov eax, dword ptr fs:[00000030h]4_2_012163FF
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0129C3CD mov eax, dword ptr fs:[00000030h]4_2_0129C3CD
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012663C0 mov eax, dword ptr fs:[00000030h]4_2_012663C0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011FE3F0 mov eax, dword ptr fs:[00000030h]4_2_011FE3F0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011FE3F0 mov eax, dword ptr fs:[00000030h]4_2_011FE3F0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011FE3F0 mov eax, dword ptr fs:[00000030h]4_2_011FE3F0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0128E3DB mov eax, dword ptr fs:[00000030h]4_2_0128E3DB
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0128E3DB mov eax, dword ptr fs:[00000030h]4_2_0128E3DB
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0128E3DB mov ecx, dword ptr fs:[00000030h]4_2_0128E3DB
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0128E3DB mov eax, dword ptr fs:[00000030h]4_2_0128E3DB
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F03E9 mov eax, dword ptr fs:[00000030h]4_2_011F03E9
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F03E9 mov eax, dword ptr fs:[00000030h]4_2_011F03E9
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F03E9 mov eax, dword ptr fs:[00000030h]4_2_011F03E9
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F03E9 mov eax, dword ptr fs:[00000030h]4_2_011F03E9
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F03E9 mov eax, dword ptr fs:[00000030h]4_2_011F03E9
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F03E9 mov eax, dword ptr fs:[00000030h]4_2_011F03E9
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F03E9 mov eax, dword ptr fs:[00000030h]4_2_011F03E9
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F03E9 mov eax, dword ptr fs:[00000030h]4_2_011F03E9
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012843D4 mov eax, dword ptr fs:[00000030h]4_2_012843D4
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012843D4 mov eax, dword ptr fs:[00000030h]4_2_012843D4
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011D823B mov eax, dword ptr fs:[00000030h]4_2_011D823B
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E6259 mov eax, dword ptr fs:[00000030h]4_2_011E6259
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011DA250 mov eax, dword ptr fs:[00000030h]4_2_011DA250
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01290274 mov eax, dword ptr fs:[00000030h]4_2_01290274
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01290274 mov eax, dword ptr fs:[00000030h]4_2_01290274
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01290274 mov eax, dword ptr fs:[00000030h]4_2_01290274
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01290274 mov eax, dword ptr fs:[00000030h]4_2_01290274
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01290274 mov eax, dword ptr fs:[00000030h]4_2_01290274
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01290274 mov eax, dword ptr fs:[00000030h]4_2_01290274
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01290274 mov eax, dword ptr fs:[00000030h]4_2_01290274
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01290274 mov eax, dword ptr fs:[00000030h]4_2_01290274
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01290274 mov eax, dword ptr fs:[00000030h]4_2_01290274
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01290274 mov eax, dword ptr fs:[00000030h]4_2_01290274
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01290274 mov eax, dword ptr fs:[00000030h]4_2_01290274
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01290274 mov eax, dword ptr fs:[00000030h]4_2_01290274
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01268243 mov eax, dword ptr fs:[00000030h]4_2_01268243
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01268243 mov ecx, dword ptr fs:[00000030h]4_2_01268243
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011D826B mov eax, dword ptr fs:[00000030h]4_2_011D826B
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012B625D mov eax, dword ptr fs:[00000030h]4_2_012B625D
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0129A250 mov eax, dword ptr fs:[00000030h]4_2_0129A250
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0129A250 mov eax, dword ptr fs:[00000030h]4_2_0129A250
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E4260 mov eax, dword ptr fs:[00000030h]4_2_011E4260
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E4260 mov eax, dword ptr fs:[00000030h]4_2_011E4260
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E4260 mov eax, dword ptr fs:[00000030h]4_2_011E4260
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012762A0 mov eax, dword ptr fs:[00000030h]4_2_012762A0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012762A0 mov ecx, dword ptr fs:[00000030h]4_2_012762A0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012762A0 mov eax, dword ptr fs:[00000030h]4_2_012762A0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012762A0 mov eax, dword ptr fs:[00000030h]4_2_012762A0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012762A0 mov eax, dword ptr fs:[00000030h]4_2_012762A0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012762A0 mov eax, dword ptr fs:[00000030h]4_2_012762A0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01260283 mov eax, dword ptr fs:[00000030h]4_2_01260283
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01260283 mov eax, dword ptr fs:[00000030h]4_2_01260283
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01260283 mov eax, dword ptr fs:[00000030h]4_2_01260283
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121E284 mov eax, dword ptr fs:[00000030h]4_2_0121E284
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121E284 mov eax, dword ptr fs:[00000030h]4_2_0121E284
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011EA2C3 mov eax, dword ptr fs:[00000030h]4_2_011EA2C3
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011EA2C3 mov eax, dword ptr fs:[00000030h]4_2_011EA2C3
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011EA2C3 mov eax, dword ptr fs:[00000030h]4_2_011EA2C3
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011EA2C3 mov eax, dword ptr fs:[00000030h]4_2_011EA2C3
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011EA2C3 mov eax, dword ptr fs:[00000030h]4_2_011EA2C3
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012B62D6 mov eax, dword ptr fs:[00000030h]4_2_012B62D6
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F02E1 mov eax, dword ptr fs:[00000030h]4_2_011F02E1
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F02E1 mov eax, dword ptr fs:[00000030h]4_2_011F02E1
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F02E1 mov eax, dword ptr fs:[00000030h]4_2_011F02E1
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0120E53E mov eax, dword ptr fs:[00000030h]4_2_0120E53E
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0120E53E mov eax, dword ptr fs:[00000030h]4_2_0120E53E
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0120E53E mov eax, dword ptr fs:[00000030h]4_2_0120E53E
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0120E53E mov eax, dword ptr fs:[00000030h]4_2_0120E53E
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0120E53E mov eax, dword ptr fs:[00000030h]4_2_0120E53E
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01276500 mov eax, dword ptr fs:[00000030h]4_2_01276500
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F0535 mov eax, dword ptr fs:[00000030h]4_2_011F0535
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F0535 mov eax, dword ptr fs:[00000030h]4_2_011F0535
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F0535 mov eax, dword ptr fs:[00000030h]4_2_011F0535
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F0535 mov eax, dword ptr fs:[00000030h]4_2_011F0535
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F0535 mov eax, dword ptr fs:[00000030h]4_2_011F0535
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F0535 mov eax, dword ptr fs:[00000030h]4_2_011F0535
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012B4500 mov eax, dword ptr fs:[00000030h]4_2_012B4500
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012B4500 mov eax, dword ptr fs:[00000030h]4_2_012B4500
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012B4500 mov eax, dword ptr fs:[00000030h]4_2_012B4500
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012B4500 mov eax, dword ptr fs:[00000030h]4_2_012B4500
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012B4500 mov eax, dword ptr fs:[00000030h]4_2_012B4500
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012B4500 mov eax, dword ptr fs:[00000030h]4_2_012B4500
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012B4500 mov eax, dword ptr fs:[00000030h]4_2_012B4500
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121656A mov eax, dword ptr fs:[00000030h]4_2_0121656A
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121656A mov eax, dword ptr fs:[00000030h]4_2_0121656A
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121656A mov eax, dword ptr fs:[00000030h]4_2_0121656A
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E8550 mov eax, dword ptr fs:[00000030h]4_2_011E8550
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E8550 mov eax, dword ptr fs:[00000030h]4_2_011E8550
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012605A7 mov eax, dword ptr fs:[00000030h]4_2_012605A7
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012605A7 mov eax, dword ptr fs:[00000030h]4_2_012605A7
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012605A7 mov eax, dword ptr fs:[00000030h]4_2_012605A7
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012045B1 mov eax, dword ptr fs:[00000030h]4_2_012045B1
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012045B1 mov eax, dword ptr fs:[00000030h]4_2_012045B1
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E2582 mov eax, dword ptr fs:[00000030h]4_2_011E2582
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E2582 mov ecx, dword ptr fs:[00000030h]4_2_011E2582
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01214588 mov eax, dword ptr fs:[00000030h]4_2_01214588
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121E59C mov eax, dword ptr fs:[00000030h]4_2_0121E59C
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0120E5E7 mov eax, dword ptr fs:[00000030h]4_2_0120E5E7
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0120E5E7 mov eax, dword ptr fs:[00000030h]4_2_0120E5E7
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0120E5E7 mov eax, dword ptr fs:[00000030h]4_2_0120E5E7
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0120E5E7 mov eax, dword ptr fs:[00000030h]4_2_0120E5E7
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0120E5E7 mov eax, dword ptr fs:[00000030h]4_2_0120E5E7
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0120E5E7 mov eax, dword ptr fs:[00000030h]4_2_0120E5E7
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0120E5E7 mov eax, dword ptr fs:[00000030h]4_2_0120E5E7
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0120E5E7 mov eax, dword ptr fs:[00000030h]4_2_0120E5E7
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121C5ED mov eax, dword ptr fs:[00000030h]4_2_0121C5ED
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121C5ED mov eax, dword ptr fs:[00000030h]4_2_0121C5ED
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E65D0 mov eax, dword ptr fs:[00000030h]4_2_011E65D0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121E5CF mov eax, dword ptr fs:[00000030h]4_2_0121E5CF
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121E5CF mov eax, dword ptr fs:[00000030h]4_2_0121E5CF
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121A5D0 mov eax, dword ptr fs:[00000030h]4_2_0121A5D0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121A5D0 mov eax, dword ptr fs:[00000030h]4_2_0121A5D0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E25E0 mov eax, dword ptr fs:[00000030h]4_2_011E25E0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01266420 mov eax, dword ptr fs:[00000030h]4_2_01266420
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01266420 mov eax, dword ptr fs:[00000030h]4_2_01266420
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01266420 mov eax, dword ptr fs:[00000030h]4_2_01266420
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01266420 mov eax, dword ptr fs:[00000030h]4_2_01266420
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01266420 mov eax, dword ptr fs:[00000030h]4_2_01266420
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01266420 mov eax, dword ptr fs:[00000030h]4_2_01266420
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01266420 mov eax, dword ptr fs:[00000030h]4_2_01266420
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121A430 mov eax, dword ptr fs:[00000030h]4_2_0121A430
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01218402 mov eax, dword ptr fs:[00000030h]4_2_01218402
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01218402 mov eax, dword ptr fs:[00000030h]4_2_01218402
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01218402 mov eax, dword ptr fs:[00000030h]4_2_01218402
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011DC427 mov eax, dword ptr fs:[00000030h]4_2_011DC427
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011DE420 mov eax, dword ptr fs:[00000030h]4_2_011DE420
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011DE420 mov eax, dword ptr fs:[00000030h]4_2_011DE420
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011DE420 mov eax, dword ptr fs:[00000030h]4_2_011DE420
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011D645D mov eax, dword ptr fs:[00000030h]4_2_011D645D
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0126C460 mov ecx, dword ptr fs:[00000030h]4_2_0126C460
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0120A470 mov eax, dword ptr fs:[00000030h]4_2_0120A470
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0120A470 mov eax, dword ptr fs:[00000030h]4_2_0120A470
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0120A470 mov eax, dword ptr fs:[00000030h]4_2_0120A470
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121E443 mov eax, dword ptr fs:[00000030h]4_2_0121E443
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121E443 mov eax, dword ptr fs:[00000030h]4_2_0121E443
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121E443 mov eax, dword ptr fs:[00000030h]4_2_0121E443
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121E443 mov eax, dword ptr fs:[00000030h]4_2_0121E443
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121E443 mov eax, dword ptr fs:[00000030h]4_2_0121E443
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121E443 mov eax, dword ptr fs:[00000030h]4_2_0121E443
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121E443 mov eax, dword ptr fs:[00000030h]4_2_0121E443
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121E443 mov eax, dword ptr fs:[00000030h]4_2_0121E443
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0120245A mov eax, dword ptr fs:[00000030h]4_2_0120245A
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0129A456 mov eax, dword ptr fs:[00000030h]4_2_0129A456
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012144B0 mov ecx, dword ptr fs:[00000030h]4_2_012144B0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0126A4B0 mov eax, dword ptr fs:[00000030h]4_2_0126A4B0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0129A49A mov eax, dword ptr fs:[00000030h]4_2_0129A49A
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E64AB mov eax, dword ptr fs:[00000030h]4_2_011E64AB
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E04E5 mov ecx, dword ptr fs:[00000030h]4_2_011E04E5
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121C720 mov eax, dword ptr fs:[00000030h]4_2_0121C720
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121C720 mov eax, dword ptr fs:[00000030h]4_2_0121C720
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E0710 mov eax, dword ptr fs:[00000030h]4_2_011E0710
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0125C730 mov eax, dword ptr fs:[00000030h]4_2_0125C730
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121273C mov eax, dword ptr fs:[00000030h]4_2_0121273C
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121273C mov ecx, dword ptr fs:[00000030h]4_2_0121273C
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121273C mov eax, dword ptr fs:[00000030h]4_2_0121273C
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121C700 mov eax, dword ptr fs:[00000030h]4_2_0121C700
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01210710 mov eax, dword ptr fs:[00000030h]4_2_01210710
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E0750 mov eax, dword ptr fs:[00000030h]4_2_011E0750
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121674D mov esi, dword ptr fs:[00000030h]4_2_0121674D
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121674D mov eax, dword ptr fs:[00000030h]4_2_0121674D
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121674D mov eax, dword ptr fs:[00000030h]4_2_0121674D
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E8770 mov eax, dword ptr fs:[00000030h]4_2_011E8770
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F0770 mov eax, dword ptr fs:[00000030h]4_2_011F0770
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F0770 mov eax, dword ptr fs:[00000030h]4_2_011F0770
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F0770 mov eax, dword ptr fs:[00000030h]4_2_011F0770
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F0770 mov eax, dword ptr fs:[00000030h]4_2_011F0770
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F0770 mov eax, dword ptr fs:[00000030h]4_2_011F0770
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F0770 mov eax, dword ptr fs:[00000030h]4_2_011F0770
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F0770 mov eax, dword ptr fs:[00000030h]4_2_011F0770
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F0770 mov eax, dword ptr fs:[00000030h]4_2_011F0770
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F0770 mov eax, dword ptr fs:[00000030h]4_2_011F0770
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F0770 mov eax, dword ptr fs:[00000030h]4_2_011F0770
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F0770 mov eax, dword ptr fs:[00000030h]4_2_011F0770
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F0770 mov eax, dword ptr fs:[00000030h]4_2_011F0770
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222750 mov eax, dword ptr fs:[00000030h]4_2_01222750
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222750 mov eax, dword ptr fs:[00000030h]4_2_01222750
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01264755 mov eax, dword ptr fs:[00000030h]4_2_01264755
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0126E75D mov eax, dword ptr fs:[00000030h]4_2_0126E75D
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012947A0 mov eax, dword ptr fs:[00000030h]4_2_012947A0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0128678E mov eax, dword ptr fs:[00000030h]4_2_0128678E
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E07AF mov eax, dword ptr fs:[00000030h]4_2_011E07AF
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0126E7E1 mov eax, dword ptr fs:[00000030h]4_2_0126E7E1
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012027ED mov eax, dword ptr fs:[00000030h]4_2_012027ED
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012027ED mov eax, dword ptr fs:[00000030h]4_2_012027ED
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012027ED mov eax, dword ptr fs:[00000030h]4_2_012027ED
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011EC7C0 mov eax, dword ptr fs:[00000030h]4_2_011EC7C0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E47FB mov eax, dword ptr fs:[00000030h]4_2_011E47FB
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E47FB mov eax, dword ptr fs:[00000030h]4_2_011E47FB
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012607C3 mov eax, dword ptr fs:[00000030h]4_2_012607C3
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01216620 mov eax, dword ptr fs:[00000030h]4_2_01216620
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01218620 mov eax, dword ptr fs:[00000030h]4_2_01218620
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F260B mov eax, dword ptr fs:[00000030h]4_2_011F260B
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F260B mov eax, dword ptr fs:[00000030h]4_2_011F260B
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F260B mov eax, dword ptr fs:[00000030h]4_2_011F260B
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F260B mov eax, dword ptr fs:[00000030h]4_2_011F260B
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F260B mov eax, dword ptr fs:[00000030h]4_2_011F260B
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F260B mov eax, dword ptr fs:[00000030h]4_2_011F260B
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F260B mov eax, dword ptr fs:[00000030h]4_2_011F260B
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0125E609 mov eax, dword ptr fs:[00000030h]4_2_0125E609
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E262C mov eax, dword ptr fs:[00000030h]4_2_011E262C
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011FE627 mov eax, dword ptr fs:[00000030h]4_2_011FE627
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01222619 mov eax, dword ptr fs:[00000030h]4_2_01222619
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121A660 mov eax, dword ptr fs:[00000030h]4_2_0121A660
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121A660 mov eax, dword ptr fs:[00000030h]4_2_0121A660
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012A866E mov eax, dword ptr fs:[00000030h]4_2_012A866E
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012A866E mov eax, dword ptr fs:[00000030h]4_2_012A866E
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01212674 mov eax, dword ptr fs:[00000030h]4_2_01212674
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011FC640 mov eax, dword ptr fs:[00000030h]4_2_011FC640
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121C6A6 mov eax, dword ptr fs:[00000030h]4_2_0121C6A6
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E4690 mov eax, dword ptr fs:[00000030h]4_2_011E4690
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E4690 mov eax, dword ptr fs:[00000030h]4_2_011E4690
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012166B0 mov eax, dword ptr fs:[00000030h]4_2_012166B0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0125E6F2 mov eax, dword ptr fs:[00000030h]4_2_0125E6F2
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0125E6F2 mov eax, dword ptr fs:[00000030h]4_2_0125E6F2
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0125E6F2 mov eax, dword ptr fs:[00000030h]4_2_0125E6F2
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0125E6F2 mov eax, dword ptr fs:[00000030h]4_2_0125E6F2
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012606F1 mov eax, dword ptr fs:[00000030h]4_2_012606F1
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012606F1 mov eax, dword ptr fs:[00000030h]4_2_012606F1
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121A6C7 mov ebx, dword ptr fs:[00000030h]4_2_0121A6C7
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121A6C7 mov eax, dword ptr fs:[00000030h]4_2_0121A6C7
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011D8918 mov eax, dword ptr fs:[00000030h]4_2_011D8918
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011D8918 mov eax, dword ptr fs:[00000030h]4_2_011D8918
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0126892A mov eax, dword ptr fs:[00000030h]4_2_0126892A
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0127892B mov eax, dword ptr fs:[00000030h]4_2_0127892B
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0125E908 mov eax, dword ptr fs:[00000030h]4_2_0125E908
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0125E908 mov eax, dword ptr fs:[00000030h]4_2_0125E908
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0126C912 mov eax, dword ptr fs:[00000030h]4_2_0126C912
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01206962 mov eax, dword ptr fs:[00000030h]4_2_01206962
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01206962 mov eax, dword ptr fs:[00000030h]4_2_01206962
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01206962 mov eax, dword ptr fs:[00000030h]4_2_01206962
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0122096E mov eax, dword ptr fs:[00000030h]4_2_0122096E
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0122096E mov edx, dword ptr fs:[00000030h]4_2_0122096E
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0122096E mov eax, dword ptr fs:[00000030h]4_2_0122096E
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01284978 mov eax, dword ptr fs:[00000030h]4_2_01284978
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01284978 mov eax, dword ptr fs:[00000030h]4_2_01284978
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0126C97C mov eax, dword ptr fs:[00000030h]4_2_0126C97C
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01260946 mov eax, dword ptr fs:[00000030h]4_2_01260946
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012B4940 mov eax, dword ptr fs:[00000030h]4_2_012B4940
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012689B3 mov esi, dword ptr fs:[00000030h]4_2_012689B3
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012689B3 mov eax, dword ptr fs:[00000030h]4_2_012689B3
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012689B3 mov eax, dword ptr fs:[00000030h]4_2_012689B3
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E09AD mov eax, dword ptr fs:[00000030h]4_2_011E09AD
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E09AD mov eax, dword ptr fs:[00000030h]4_2_011E09AD
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F29A0 mov eax, dword ptr fs:[00000030h]4_2_011F29A0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F29A0 mov eax, dword ptr fs:[00000030h]4_2_011F29A0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F29A0 mov eax, dword ptr fs:[00000030h]4_2_011F29A0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F29A0 mov eax, dword ptr fs:[00000030h]4_2_011F29A0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F29A0 mov eax, dword ptr fs:[00000030h]4_2_011F29A0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F29A0 mov eax, dword ptr fs:[00000030h]4_2_011F29A0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F29A0 mov eax, dword ptr fs:[00000030h]4_2_011F29A0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F29A0 mov eax, dword ptr fs:[00000030h]4_2_011F29A0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F29A0 mov eax, dword ptr fs:[00000030h]4_2_011F29A0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F29A0 mov eax, dword ptr fs:[00000030h]4_2_011F29A0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F29A0 mov eax, dword ptr fs:[00000030h]4_2_011F29A0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F29A0 mov eax, dword ptr fs:[00000030h]4_2_011F29A0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F29A0 mov eax, dword ptr fs:[00000030h]4_2_011F29A0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0126E9E0 mov eax, dword ptr fs:[00000030h]4_2_0126E9E0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011EA9D0 mov eax, dword ptr fs:[00000030h]4_2_011EA9D0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011EA9D0 mov eax, dword ptr fs:[00000030h]4_2_011EA9D0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011EA9D0 mov eax, dword ptr fs:[00000030h]4_2_011EA9D0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011EA9D0 mov eax, dword ptr fs:[00000030h]4_2_011EA9D0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011EA9D0 mov eax, dword ptr fs:[00000030h]4_2_011EA9D0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011EA9D0 mov eax, dword ptr fs:[00000030h]4_2_011EA9D0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012129F9 mov eax, dword ptr fs:[00000030h]4_2_012129F9
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012129F9 mov eax, dword ptr fs:[00000030h]4_2_012129F9
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012769C0 mov eax, dword ptr fs:[00000030h]4_2_012769C0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012149D0 mov eax, dword ptr fs:[00000030h]4_2_012149D0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012AA9D3 mov eax, dword ptr fs:[00000030h]4_2_012AA9D3
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121A830 mov eax, dword ptr fs:[00000030h]4_2_0121A830
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0128483A mov eax, dword ptr fs:[00000030h]4_2_0128483A
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0128483A mov eax, dword ptr fs:[00000030h]4_2_0128483A
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01202835 mov eax, dword ptr fs:[00000030h]4_2_01202835
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01202835 mov eax, dword ptr fs:[00000030h]4_2_01202835
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01202835 mov eax, dword ptr fs:[00000030h]4_2_01202835
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01202835 mov ecx, dword ptr fs:[00000030h]4_2_01202835
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01202835 mov eax, dword ptr fs:[00000030h]4_2_01202835
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01202835 mov eax, dword ptr fs:[00000030h]4_2_01202835
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0126C810 mov eax, dword ptr fs:[00000030h]4_2_0126C810
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E4859 mov eax, dword ptr fs:[00000030h]4_2_011E4859
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E4859 mov eax, dword ptr fs:[00000030h]4_2_011E4859
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0126E872 mov eax, dword ptr fs:[00000030h]4_2_0126E872
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0126E872 mov eax, dword ptr fs:[00000030h]4_2_0126E872
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01276870 mov eax, dword ptr fs:[00000030h]4_2_01276870
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01276870 mov eax, dword ptr fs:[00000030h]4_2_01276870
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F2840 mov ecx, dword ptr fs:[00000030h]4_2_011F2840
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01210854 mov eax, dword ptr fs:[00000030h]4_2_01210854
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E0887 mov eax, dword ptr fs:[00000030h]4_2_011E0887
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0126C89D mov eax, dword ptr fs:[00000030h]4_2_0126C89D
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012AA8E4 mov eax, dword ptr fs:[00000030h]4_2_012AA8E4
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121C8F9 mov eax, dword ptr fs:[00000030h]4_2_0121C8F9
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121C8F9 mov eax, dword ptr fs:[00000030h]4_2_0121C8F9
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0120E8C0 mov eax, dword ptr fs:[00000030h]4_2_0120E8C0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012B08C0 mov eax, dword ptr fs:[00000030h]4_2_012B08C0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0120EB20 mov eax, dword ptr fs:[00000030h]4_2_0120EB20
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0120EB20 mov eax, dword ptr fs:[00000030h]4_2_0120EB20
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012A8B28 mov eax, dword ptr fs:[00000030h]4_2_012A8B28
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012A8B28 mov eax, dword ptr fs:[00000030h]4_2_012A8B28
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012B4B00 mov eax, dword ptr fs:[00000030h]4_2_012B4B00
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0125EB1D mov eax, dword ptr fs:[00000030h]4_2_0125EB1D
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0125EB1D mov eax, dword ptr fs:[00000030h]4_2_0125EB1D
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0125EB1D mov eax, dword ptr fs:[00000030h]4_2_0125EB1D
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0125EB1D mov eax, dword ptr fs:[00000030h]4_2_0125EB1D
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0125EB1D mov eax, dword ptr fs:[00000030h]4_2_0125EB1D
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0125EB1D mov eax, dword ptr fs:[00000030h]4_2_0125EB1D
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0125EB1D mov eax, dword ptr fs:[00000030h]4_2_0125EB1D
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0125EB1D mov eax, dword ptr fs:[00000030h]4_2_0125EB1D
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0125EB1D mov eax, dword ptr fs:[00000030h]4_2_0125EB1D
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011D8B50 mov eax, dword ptr fs:[00000030h]4_2_011D8B50
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01294B4B mov eax, dword ptr fs:[00000030h]4_2_01294B4B
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01294B4B mov eax, dword ptr fs:[00000030h]4_2_01294B4B
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011DCB7E mov eax, dword ptr fs:[00000030h]4_2_011DCB7E
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01276B40 mov eax, dword ptr fs:[00000030h]4_2_01276B40
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01276B40 mov eax, dword ptr fs:[00000030h]4_2_01276B40
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012AAB40 mov eax, dword ptr fs:[00000030h]4_2_012AAB40
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01288B42 mov eax, dword ptr fs:[00000030h]4_2_01288B42
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0128EB50 mov eax, dword ptr fs:[00000030h]4_2_0128EB50
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012B2B57 mov eax, dword ptr fs:[00000030h]4_2_012B2B57
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012B2B57 mov eax, dword ptr fs:[00000030h]4_2_012B2B57
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012B2B57 mov eax, dword ptr fs:[00000030h]4_2_012B2B57
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012B2B57 mov eax, dword ptr fs:[00000030h]4_2_012B2B57
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01294BB0 mov eax, dword ptr fs:[00000030h]4_2_01294BB0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01294BB0 mov eax, dword ptr fs:[00000030h]4_2_01294BB0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F0BBE mov eax, dword ptr fs:[00000030h]4_2_011F0BBE
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F0BBE mov eax, dword ptr fs:[00000030h]4_2_011F0BBE
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E0BCD mov eax, dword ptr fs:[00000030h]4_2_011E0BCD
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E0BCD mov eax, dword ptr fs:[00000030h]4_2_011E0BCD
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E0BCD mov eax, dword ptr fs:[00000030h]4_2_011E0BCD
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0126CBF0 mov eax, dword ptr fs:[00000030h]4_2_0126CBF0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0120EBFC mov eax, dword ptr fs:[00000030h]4_2_0120EBFC
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01200BCB mov eax, dword ptr fs:[00000030h]4_2_01200BCB
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01200BCB mov eax, dword ptr fs:[00000030h]4_2_01200BCB
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01200BCB mov eax, dword ptr fs:[00000030h]4_2_01200BCB
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E8BF0 mov eax, dword ptr fs:[00000030h]4_2_011E8BF0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E8BF0 mov eax, dword ptr fs:[00000030h]4_2_011E8BF0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E8BF0 mov eax, dword ptr fs:[00000030h]4_2_011E8BF0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0128EBD0 mov eax, dword ptr fs:[00000030h]4_2_0128EBD0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121CA24 mov eax, dword ptr fs:[00000030h]4_2_0121CA24
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0120EA2E mov eax, dword ptr fs:[00000030h]4_2_0120EA2E
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01204A35 mov eax, dword ptr fs:[00000030h]4_2_01204A35
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01204A35 mov eax, dword ptr fs:[00000030h]4_2_01204A35
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121CA38 mov eax, dword ptr fs:[00000030h]4_2_0121CA38
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0126CA11 mov eax, dword ptr fs:[00000030h]4_2_0126CA11
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F0A5B mov eax, dword ptr fs:[00000030h]4_2_011F0A5B
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011F0A5B mov eax, dword ptr fs:[00000030h]4_2_011F0A5B
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0128EA60 mov eax, dword ptr fs:[00000030h]4_2_0128EA60
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121CA6F mov eax, dword ptr fs:[00000030h]4_2_0121CA6F
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121CA6F mov eax, dword ptr fs:[00000030h]4_2_0121CA6F
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0121CA6F mov eax, dword ptr fs:[00000030h]4_2_0121CA6F
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E6A50 mov eax, dword ptr fs:[00000030h]4_2_011E6A50
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E6A50 mov eax, dword ptr fs:[00000030h]4_2_011E6A50
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E6A50 mov eax, dword ptr fs:[00000030h]4_2_011E6A50
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E6A50 mov eax, dword ptr fs:[00000030h]4_2_011E6A50
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E6A50 mov eax, dword ptr fs:[00000030h]4_2_011E6A50
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E6A50 mov eax, dword ptr fs:[00000030h]4_2_011E6A50
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E6A50 mov eax, dword ptr fs:[00000030h]4_2_011E6A50
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0125CA72 mov eax, dword ptr fs:[00000030h]4_2_0125CA72
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_0125CA72 mov eax, dword ptr fs:[00000030h]4_2_0125CA72
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01236AA4 mov eax, dword ptr fs:[00000030h]4_2_01236AA4
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011EEA80 mov eax, dword ptr fs:[00000030h]4_2_011EEA80
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011EEA80 mov eax, dword ptr fs:[00000030h]4_2_011EEA80
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011EEA80 mov eax, dword ptr fs:[00000030h]4_2_011EEA80
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011EEA80 mov eax, dword ptr fs:[00000030h]4_2_011EEA80
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011EEA80 mov eax, dword ptr fs:[00000030h]4_2_011EEA80
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011EEA80 mov eax, dword ptr fs:[00000030h]4_2_011EEA80
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011EEA80 mov eax, dword ptr fs:[00000030h]4_2_011EEA80
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011EEA80 mov eax, dword ptr fs:[00000030h]4_2_011EEA80
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011EEA80 mov eax, dword ptr fs:[00000030h]4_2_011EEA80
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_012B4A80 mov eax, dword ptr fs:[00000030h]4_2_012B4A80
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_01218A90 mov edx, dword ptr fs:[00000030h]4_2_01218A90
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeCode function: 4_2_011E8AA0 mov eax, dword ptr fs:[00000030h]4_2_011E8AA0
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_008F1AC3 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_008F1AC3
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe"
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe"Jump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeNtClose: Indirect: 0x157A56C
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeNtQueueApcThread: Indirect: 0x157A4F2Jump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeMemory written: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: NULL target: C:\Windows\SysWOW64\colorcpl.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection loaded: NULL target: C:\Windows\SysWOW64\colorcpl.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
          Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeThread register set: target process: 4004Jump to behavior
          Source: C:\Windows\SysWOW64\colorcpl.exeThread register set: target process: 4004Jump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeThread APC queued: target process: C:\Windows\explorer.exeJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeSection unmapped: C:\Windows\SysWOW64\colorcpl.exe base address: 8F0000Jump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe"Jump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeProcess created: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe "C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe"Jump to behavior
          Source: explorer.exe, 00000006.00000000.2157639279.00000000013A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000002.3358112467.00000000013A1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: IProgram Manager
          Source: explorer.exe, 00000006.00000000.2157639279.00000000013A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000000.2159724108.00000000048E0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3358112467.00000000013A1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000006.00000000.2157639279.00000000013A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000002.3358112467.00000000013A1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000006.00000002.3347634724.0000000000D60000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2157138817.0000000000D69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: +Progman
          Source: explorer.exe, 00000006.00000000.2157639279.00000000013A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000002.3358112467.00000000013A1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
          Source: explorer.exe, 00000006.00000000.2174937509.00000000098AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3366414703.00000000098AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd31A
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeQueries volume information: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_008F1975 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,7_2_008F1975
          Source: C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 4.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.3351494869.0000000003650000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.2227875031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2171913312.00000000048BA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3349619553.0000000003520000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 4.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4afeeb8.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe.4a8ee98.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.3351494869.0000000003650000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.2227875031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2171913312.00000000048BA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3349619553.0000000003520000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Shared Modules
          1
          DLL Side-Loading
          512
          Process Injection
          1
          Rootkit
          1
          Credential API Hooking
          1
          System Time Discovery
          Remote Services1
          Credential API Hooking
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          Abuse Elevation Control Mechanism
          1
          Masquerading
          LSASS Memory221
          Security Software Discovery
          Remote Desktop Protocol1
          Archive Collected Data
          2
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
          DLL Side-Loading
          11
          Disable or Modify Tools
          Security Account Manager2
          Process Discovery
          SMB/Windows Admin SharesData from Network Shared Drive2
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook41
          Virtualization/Sandbox Evasion
          NTDS41
          Virtualization/Sandbox Evasion
          Distributed Component Object ModelInput Capture12
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script512
          Process Injection
          LSA Secrets1
          Application Window Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Deobfuscate/Decode Files or Information
          Cached Domain Credentials1
          File and Directory Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          Abuse Elevation Control Mechanism
          DCSync213
          System Information Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job4
          Obfuscated Files or Information
          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
          Software Packing
          /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
          DLL Side-Loading
          Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1490435 Sample: Bien nhan thanh toan Swift ... Startdate: 09/08/2024 Architecture: WINDOWS Score: 100 34 www.nuevobajonfavorito.com 2->34 36 www.ma-google.com 2->36 38 4 other IPs or domains 2->38 46 Multi AV Scanner detection for domain / URL 2->46 48 Found malware configuration 2->48 50 Malicious sample detected (through community Yara rule) 2->50 52 14 other signatures 2->52 11 Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe 4 2->11         started        signatures3 process4 file5 32 Bien nhan thanh to...9509220_pdf.exe.log, ASCII 11->32 dropped 62 Adds a directory exclusion to Windows Defender 11->62 64 Injects a PE file into a foreign processes 11->64 15 Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe 11->15         started        18 powershell.exe 23 11->18         started        signatures6 process7 signatures8 66 Modifies the context of a thread in another process (thread injection) 15->66 68 Maps a DLL or memory area into another process 15->68 70 Sample uses process hollowing technique 15->70 74 2 other signatures 15->74 20 explorer.exe 34 1 15->20 injected 72 Loading BitLocker PowerShell Module 18->72 23 conhost.exe 18->23         started        process9 dnsIp10 40 www.jnhdh8827.com 188.114.96.3, 50152, 80 CLOUDFLARENETUS European Union 20->40 42 www.loyalbahis356.com 185.148.106.70, 50146, 80 TESONETLT Russian Federation 20->42 44 www-guangdongqiangzhetc-com.258fuwu.com 119.3.37.137, 50149, 80 HWCSNETHuaweiCloudServicedatacenterCN China 20->44 25 colorcpl.exe 20->25         started        process11 signatures12 54 Modifies the context of a thread in another process (thread injection) 25->54 56 Maps a DLL or memory area into another process 25->56 58 Tries to detect virtualization through RDTSC time measurements 25->58 60 Switches to a custom stack to bypass stack traces 25->60 28 cmd.exe 1 25->28         started        process13 process14 30 conhost.exe 28->30         started       

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe58%ReversingLabsWin32.Trojan.Leonem
          Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe53%VirustotalBrowse
          Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          www.loyalbahis356.com1%VirustotalBrowse
          www.jnhdh8827.com12%VirustotalBrowse
          www.nuevobajonfavorito.com1%VirustotalBrowse
          www.ma-google.com1%VirustotalBrowse
          www.guangdongqiangzhetc.com0%VirustotalBrowse
          SourceDetectionScannerLabelLink
          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV0%URL Reputationsafe
          https://api.msn.com:443/v1/news/Feed/Windows?0%URL Reputationsafe
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
          https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings0%URL Reputationsafe
          https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
          http://www.loyalbahis356.com/pz12/?tX9tN=1bMtYrqh7B54XFQP&uTm4D=mhHbh1AUgvkDqhcxvrHPgmJxw//lx/+38lrQrf/b9xTaJsLm+Z3/RBaY9L5MXxl4E5aW6imDag==100%Avira URL Cloudmalware
          http://www.autonwheels.comReferer:0%Avira URL Cloudsafe
          http://www.shrisona.com100%Avira URL Cloudmalware
          http://www.ainth.com0%Avira URL Cloudsafe
          https://android.notify.windows.com/iOS0%URL Reputationsafe
          http://www.pureamyl.com/pz12/www.317wb.com100%Avira URL Cloudmalware
          https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp0%URL Reputationsafe
          https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the0%URL Reputationsafe
          https://api.msn.com/v1/news/Feed/Windows?0%URL Reputationsafe
          http://schemas.micro0%URL Reputationsafe
          http://www.gabbygomez.com/pz12/www.missorris.com0%Avira URL Cloudsafe
          https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
          https://www.msn.com/en-us/money/savingandinvesting/americans-average-net-worth-by-age/ar-AA1h4ngF0%Avira URL Cloudsafe
          https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg0%URL Reputationsafe
          http://www.cripmz.xyz0%Avira URL Cloudsafe
          https://api.msn.com/0%URL Reputationsafe
          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark0%URL Reputationsafe
          http://www.shrisona.com/pz12/100%Avira URL Cloudmalware
          https://www.msn.com:443/en-us/feed0%URL Reputationsafe
          https://word.office.comM0%Avira URL Cloudsafe
          www.jnhdh8827.com/pz12/0%Avira URL Cloudsafe
          http://www.ainth.com0%VirustotalBrowse
          http://www.gabbygomez.com/pz12/www.missorris.com2%VirustotalBrowse
          http://www.cripmz.xyz0%VirustotalBrowse
          http://www.shrisona.com/pz12/1%VirustotalBrowse
          www.jnhdh8827.com/pz12/13%VirustotalBrowse
          http://www.shrisona.comReferer:0%Avira URL Cloudsafe
          http://www.jnhdh8827.com/pz12/www.ma-google.com0%Avira URL Cloudsafe
          https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-0%Avira URL Cloudsafe
          http://www.98980901.com0%Avira URL Cloudsafe
          http://www.shrisona.com8%VirustotalBrowse
          http://www.motchillssss.top100%Avira URL Cloudmalware
          http://www.autonwheels.com100%Avira URL Cloudmalware
          https://www.msn.com/en-us/news/politics/how-donald-trump-helped-kari-lake-become-arizona-s-and-ameri0%Avira URL Cloudsafe
          http://www.jnhdh8827.com/pz12/www.ma-google.com13%VirustotalBrowse
          http://www.loyalbahis356.com/pz12/www.guangdongqiangzhetc.com100%Avira URL Cloudmalware
          http://www.loyalbahis356.comReferer:0%Avira URL Cloudsafe
          http://www.motchillssss.top0%VirustotalBrowse
          http://www.gabbygomez.comReferer:0%Avira URL Cloudsafe
          http://www.autonwheels.com6%VirustotalBrowse
          http://www.motchillssss.top/pz12/100%Avira URL Cloudmalware
          http://www.jnhdh8827.comReferer:0%Avira URL Cloudsafe
          http://www.cripmz.xyzReferer:0%Avira URL Cloudsafe
          http://www.98980901.com1%VirustotalBrowse
          https://wns.windows.com/e0%Avira URL Cloudsafe
          http://www.nuevobajonfavorito.com0%Avira URL Cloudsafe
          http://www.98980901.comReferer:0%Avira URL Cloudsafe
          http://www.slotgame99.bet0%Avira URL Cloudsafe
          http://www.autonwheels.com/pz12/100%Avira URL Cloudmalware
          http://www.missorris.comReferer:0%Avira URL Cloudsafe
          http://www.ma-google.com/pz12/www.ainth.com0%Avira URL Cloudsafe
          https://api.msn.com/v1/news/Feed/Windows?activityId=435B7A89D7D74BDF801F2DA188906BAF&timeOut=5000&oc0%Avira URL Cloudsafe
          http://www.317wb.comReferer:0%Avira URL Cloudsafe
          http://www.motchillssss.top/pz12/2%VirustotalBrowse
          http://www.slotgame99.bet7%VirustotalBrowse
          http://www.gabbygomez.com/pz12/0%Avira URL Cloudsafe
          https://www.msn.com/en-us/travel/news/you-can-t-beat-bobby-flay-s-phoenix-airport-restaurant-one-of-0%Avira URL Cloudsafe
          http://www.autonwheels.com/pz12/5%VirustotalBrowse
          http://www.ma-google.comReferer:0%Avira URL Cloudsafe
          http://www.missorris.com/pz12/www.shrisona.com100%Avira URL Cloudmalware
          http://www.gabbygomez.com0%Avira URL Cloudsafe
          http://www.guangdongqiangzhetc.com0%Avira URL Cloudsafe
          http://www.nuevobajonfavorito.com1%VirustotalBrowse
          http://www.cripmz.xyz/pz12/www.pureamyl.com0%Avira URL Cloudsafe
          http://www.autonwheels.com/pz12/www.slotgame99.bet100%Avira URL Cloudmalware
          http://www.ainth.comReferer:0%Avira URL Cloudsafe
          http://www.317wb.com0%Avira URL Cloudsafe
          http://www.loyalbahis356.com100%Avira URL Cloudmalware
          https://outlook.come0%Avira URL Cloudsafe
          http://www.missorris.com0%Avira URL Cloudsafe
          https://www.msn.com/en-us/news/politics/kevin-mccarthy-s-ouster-as-house-speaker-could-cost-gop-its-0%Avira URL Cloudsafe
          http://www.guangdongqiangzhetc.com/pz12/www.nuevobajonfavorito.com0%Avira URL Cloudsafe
          http://www.guangdongqiangzhetc.com/pz12/0%Avira URL Cloudsafe
          http://www.nuevobajonfavorito.comReferer:0%Avira URL Cloudsafe
          http://www.shrisona.com/pz12/www.cripmz.xyz100%Avira URL Cloudmalware
          https://api.msn.com/I0%Avira URL Cloudsafe
          https://loyalbahis356.com/pz12/?tX9tN=1bMtYrqh7B54XFQP&uTm4D=mhHbh1AUgvkDqhcxvrHPgmJxw//lx/100%Avira URL Cloudmalware
          http://www.ma-google.com0%Avira URL Cloudsafe
          http://www.jnhdh8827.com0%Avira URL Cloudsafe
          http://www.guangdongqiangzhetc.comReferer:0%Avira URL Cloudsafe
          http://www.missorris.com/pz12/100%Avira URL Cloudmalware
          http://www.ma-google.com/pz12/0%Avira URL Cloudsafe
          http://www.ainth.com/pz12/www.motchillssss.top0%Avira URL Cloudsafe
          http://www.nuevobajonfavorito.com/pz12/100%Avira URL Cloudmalware
          http://www.motchillssss.topReferer:0%Avira URL Cloudsafe
          http://www.pureamyl.com/pz12/100%Avira URL Cloudmalware
          http://www.98980901.com/pz12/0%Avira URL Cloudsafe
          https://www.msn.com/en-us/news/politics/republicans-already-barred-trump-from-being-speaker-of-the-h0%Avira URL Cloudsafe
          https://www.msn.com/en-us/news/politics/trump-campaign-says-he-raised-more-than-45-million-in-3rd-qu0%Avira URL Cloudsafe
          http://www.pureamyl.comReferer:0%Avira URL Cloudsafe
          http://www.slotgame99.bet/pz12/www.gabbygomez.com0%Avira URL Cloudsafe
          http://www.guangdongqiangzhetc.com/pz12/?uTm4D=rT/73z/FHFKsO0wYdmnc3t2OPINEEa6kIjITgDoEX6ai3/vo6h3AOPFXSKl3lYmsmBcXMl/3wg==&tX9tN=1bMtYrqh7B54XFQP0%Avira URL Cloudsafe
          http://www.slotgame99.betReferer:0%Avira URL Cloudsafe
          http://www.98980901.com/pz12/www.autonwheels.com0%Avira URL Cloudsafe
          http://www.motchillssss.top/pz12/www.98980901.com100%Avira URL Cloudmalware
          NameIPActiveMaliciousAntivirus DetectionReputation
          www.loyalbahis356.com
          185.148.106.70
          truefalseunknown
          www-guangdongqiangzhetc-com.258fuwu.com
          119.3.37.137
          truefalse
            unknown
            www.jnhdh8827.com
            188.114.96.3
            truetrueunknown
            www.guangdongqiangzhetc.com
            unknown
            unknowntrueunknown
            www.nuevobajonfavorito.com
            unknown
            unknowntrueunknown
            www.ma-google.com
            unknown
            unknowntrueunknown
            NameMaliciousAntivirus DetectionReputation
            http://www.loyalbahis356.com/pz12/?tX9tN=1bMtYrqh7B54XFQP&uTm4D=mhHbh1AUgvkDqhcxvrHPgmJxw//lx/+38lrQrf/b9xTaJsLm+Z3/RBaY9L5MXxl4E5aW6imDag==true
            • Avira URL Cloud: malware
            unknown
            www.jnhdh8827.com/pz12/true
            • 13%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.guangdongqiangzhetc.com/pz12/?uTm4D=rT/73z/FHFKsO0wYdmnc3t2OPINEEa6kIjITgDoEX6ai3/vo6h3AOPFXSKl3lYmsmBcXMl/3wg==&tX9tN=1bMtYrqh7B54XFQPfalse
            • Avira URL Cloud: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://www.pureamyl.com/pz12/www.317wb.comexplorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmptrue
            • Avira URL Cloud: malware
            unknown
            http://www.shrisona.comexplorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmptrue
            • 8%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            http://www.autonwheels.comReferer:explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.ainth.comexplorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DVexplorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.gabbygomez.com/pz12/www.missorris.comexplorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • 2%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://www.msn.com/en-us/money/savingandinvesting/americans-average-net-worth-by-age/ar-AA1h4ngFexplorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.cripmz.xyzexplorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 00000006.00000002.3365438539.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2173161867.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.shrisona.com/pz12/explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmptrue
            • 1%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            https://word.office.comMexplorer.exe, 00000006.00000003.3075508887.000000000C087000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3371448733.000000000C087000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2180275775.000000000C048000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.shrisona.comReferer:explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmptrue
            • Avira URL Cloud: safe
            unknown
            http://www.jnhdh8827.com/pz12/www.ma-google.comexplorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmptrue
            • 13%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-explorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.98980901.comexplorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.motchillssss.topexplorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            http://www.autonwheels.comexplorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • 6%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            https://www.msn.com/en-us/news/politics/how-donald-trump-helped-kari-lake-become-arizona-s-and-ameriexplorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.loyalbahis356.com/pz12/www.guangdongqiangzhetc.comexplorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: malware
            unknown
            http://www.loyalbahis356.comReferer:explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.gabbygomez.comReferer:explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.motchillssss.top/pz12/explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • 2%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            http://www.jnhdh8827.comReferer:explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmptrue
            • Avira URL Cloud: safe
            unknown
            http://www.cripmz.xyzReferer:explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://wns.windows.com/eexplorer.exe, 00000006.00000002.3366414703.00000000099AB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2174937509.00000000099AB000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameBien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe, 00000000.00000002.2163845733.00000000030BA000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.nuevobajonfavorito.comexplorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.98980901.comReferer:explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.slotgame99.betexplorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • 7%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earningsexplorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.autonwheels.com/pz12/explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • 5%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            http://www.missorris.comReferer:explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.ma-google.com/pz12/www.ainth.comexplorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://api.msn.com/v1/news/Feed/Windows?activityId=435B7A89D7D74BDF801F2DA188906BAF&timeOut=5000&ocexplorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.317wb.comReferer:explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.gabbygomez.com/pz12/explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.msn.com/en-us/travel/news/you-can-t-beat-bobby-flay-s-phoenix-airport-restaurant-one-of-explorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.ma-google.comReferer:explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.missorris.com/pz12/www.shrisona.comexplorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: malware
            unknown
            http://www.gabbygomez.comexplorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.guangdongqiangzhetc.comexplorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.cripmz.xyz/pz12/www.pureamyl.comexplorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.autonwheels.com/pz12/www.slotgame99.betexplorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: malware
            unknown
            http://www.ainth.comReferer:explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.317wb.comexplorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.loyalbahis356.comexplorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: malware
            unknown
            https://android.notify.windows.com/iOSexplorer.exe, 00000006.00000002.3371448733.000000000BFDF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2180275775.000000000BFDF000.00000004.00000001.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://outlook.comeexplorer.exe, 00000006.00000003.3075508887.000000000C087000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3371448733.000000000C087000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2180275775.000000000C048000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppexplorer.exe, 00000006.00000002.3366414703.00000000099AB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2174937509.00000000099AB000.00000004.00000001.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-theexplorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.missorris.comexplorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.guangdongqiangzhetc.com/pz12/www.nuevobajonfavorito.comexplorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.msn.com/en-us/news/politics/kevin-mccarthy-s-ouster-as-house-speaker-could-cost-gop-its-explorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.guangdongqiangzhetc.com/pz12/explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.nuevobajonfavorito.comReferer:explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://api.msn.com/v1/news/Feed/Windows?explorer.exe, 00000006.00000000.2173161867.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3365438539.000000000962B000.00000004.00000001.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.shrisona.com/pz12/www.cripmz.xyzexplorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmptrue
            • Avira URL Cloud: malware
            unknown
            https://api.msn.com/Iexplorer.exe, 00000006.00000000.2173161867.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3365438539.000000000962B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://loyalbahis356.com/pz12/?tX9tN=1bMtYrqh7B54XFQP&uTm4D=mhHbh1AUgvkDqhcxvrHPgmJxw//lx/explorer.exe, 00000006.00000002.3375867224.00000000111EF000.00000004.80000000.00040000.00000000.sdmp, colorcpl.exe, 00000007.00000002.3359339239.0000000005BFF000.00000004.10000000.00040000.00000000.sdmpfalse
            • Avira URL Cloud: malware
            unknown
            http://www.ma-google.comexplorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.guangdongqiangzhetc.comReferer:explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.jnhdh8827.comexplorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmptrue
            • Avira URL Cloud: safe
            unknown
            http://www.missorris.com/pz12/explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: malware
            unknown
            http://schemas.microexplorer.exe, 00000006.00000002.3364148653.0000000007B60000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000002.3364126550.0000000007B50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000000.2157798037.00000000028A0000.00000002.00000001.00040000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.ma-google.com/pz12/explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.nuevobajonfavorito.com/pz12/explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: malware
            unknown
            http://www.ainth.com/pz12/www.motchillssss.topexplorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.motchillssss.topReferer:explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.pureamyl.com/pz12/explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: malware
            unknown
            http://www.98980901.com/pz12/explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.msn.com/en-us/news/politics/republicans-already-barred-trump-from-being-speaker-of-the-hexplorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.msn.com/en-us/news/politics/trump-campaign-says-he-raised-more-than-45-million-in-3rd-quexplorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.pureamyl.comReferer:explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.slotgame99.bet/pz12/www.gabbygomez.comexplorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.slotgame99.betReferer:explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.98980901.com/pz12/www.autonwheels.comexplorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.motchillssss.top/pz12/www.98980901.comexplorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: malware
            unknown
            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhzexplorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://excel.office.com-explorer.exe, 00000006.00000003.3075508887.000000000C087000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3371448733.000000000C087000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.2180275775.000000000C048000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svgexplorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.317wb.com/pz12/explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz-darkexplorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.msn.com/en-us/money/personalfinance/money-matters-changing-institution-of-marriage/ar-AAexplorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.msn.com/en-us/news/us/biden-administration-waives-26-federal-laws-to-allow-border-wall-cexplorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.msn.com/en-us/weather/topstories/california-s-reservoirs-runneth-over-in-astounding-reveexplorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.cripmz.xyz/pz12/explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://powerpoint.office.comEMdexplorer.exe, 00000006.00000000.2180275775.000000000BFEF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3371448733.000000000BFEF000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.nuevobajonfavorito.com/pz12/www.jnhdh8827.comexplorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmptrue
            • Avira URL Cloud: malware
            unknown
            http://www.ainth.com/pz12/explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.msn.com/en-us/news/technology/a-federal-emergency-alert-will-be-sent-to-us-phones-nationexplorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.slotgame99.bet/pz12/explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://api.msn.com/explorer.exe, 00000006.00000000.2173161867.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3365438539.000000000962B000.00000004.00000001.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.jnhdh8827.com/pz12/explorer.exe, 00000006.00000003.2979320613.000000000C4F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3075027125.000000000C50B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3372800348.000000000C50B000.00000004.00000001.00020000.00000000.sdmptrue
            • Avira URL Cloud: safe
            unknown
            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-darkexplorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://www.msn.com:443/en-us/feedexplorer.exe, 00000006.00000000.2160009692.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3362876952.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            119.3.37.137
            www-guangdongqiangzhetc-com.258fuwu.comChina
            55990HWCSNETHuaweiCloudServicedatacenterCNfalse
            185.148.106.70
            www.loyalbahis356.comRussian Federation
            201341TESONETLTfalse
            188.114.96.3
            www.jnhdh8827.comEuropean Union
            13335CLOUDFLARENETUStrue
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1490435
            Start date and time:2024-08-09 09:21:04 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 9m 2s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:14
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:1
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@11/6@6/3
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 94%
            • Number of executed functions: 124
            • Number of non-executed functions: 279
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
            • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report creation exceeded maximum time and may have missing disassembly code information.
            • Report size exceeded maximum capacity and may have missing behavior information.
            • Report size getting too big, too many NtCreateKey calls found.
            • Report size getting too big, too many NtEnumerateKey calls found.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            TimeTypeDescription
            03:21:53API Interceptor1x Sleep call for process: Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe modified
            03:21:59API Interceptor11x Sleep call for process: powershell.exe modified
            03:22:00API Interceptor1330122x Sleep call for process: explorer.exe modified
            03:22:47API Interceptor1803349x Sleep call for process: colorcpl.exe modified
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            185.148.106.70Ticari Siparis Belgesi 26 07 2024 17545000600.exeGet hashmaliciousFormBookBrowse
            • www.loyalbahis356.com/pz12/?XvRxR=rTfdhh5hH2&NBtT=mhHbh1AUgvkDqhcxvrHPgmJxw//lx/+38lrQrf/b9xTaJsLm+Z3/RBaY9L1MEhp7dpaA
            188.114.96.3z4Nuevalistaadjunta.exeGet hashmaliciousDBatLoader, FormBookBrowse
            • www.coinwab.com/kqqj/
            ACCEPT_014STSY529093.PDF.exeGet hashmaliciousAzorultBrowse
            • l0h5.shop/CM341/index.php
            Ticari Siparis Belgesi 07 08 2024 18545075600_pdf.exeGet hashmaliciousFormBookBrowse
            • www.jnhdh8827.com/pz12/?Fvt=tXrQrgXPfQCqrAqcdoT/KCxiftMWx+uc6jO1VE/0fl1BeE1n2goaTZbQHXLLcLIs9Jvq&3fMpsD=BfiHV2ph_4
            Payment advice.exeGet hashmaliciousFormBookBrowse
            • www.aggame.asia/0dmj/
            709282738372873.exeGet hashmaliciousFormBookBrowse
            • www.coinwab.com/kqqj/
            Document 240000807.exeGet hashmaliciousFormBookBrowse
            • www.lampgm.pro/em9t/
            http://cs2024-cs.fdabv.com/Get hashmaliciousUnknownBrowse
            • cs2024-cs.fdabv.com/
            QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
            • filetransfer.io/data-package/HPg28kQA/download
            QUOTATION_AUGQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
            • filetransfer.io/data-package/7wFhpez4/download
            QUOTATION_AUGQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
            • filetransfer.io/data-package/jdxFnPJT/download
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            www.loyalbahis356.comTicari Siparis Belgesi 26 07 2024 17545000600.exeGet hashmaliciousFormBookBrowse
            • 185.148.106.70
            Documento di bonifico bancario intesa Sanpaola 20240613 EUR23750.exeGet hashmaliciousFormBookBrowse
            • 185.148.106.71
            www.jnhdh8827.comTicari Siparis Belgesi 07 08 2024 18545075600_pdf.exeGet hashmaliciousFormBookBrowse
            • 188.114.96.3
            Ticari Siparis Belgesi 26 07 2024 17545000600.exeGet hashmaliciousFormBookBrowse
            • 188.114.96.3
            rFormulariodeso.exeGet hashmaliciousFormBook, PureLog StealerBrowse
            • 188.114.96.3
            Steel pipes material data sheets Bill of Quantity Valves chemicals KM C654e21011710050.exeGet hashmaliciousFormBook, PureLog StealerBrowse
            • 188.114.96.3
            Material data sheets Bill of Quantity Steel pipes and chemicals KM C654e21011710050.exeGet hashmaliciousFormBook, PureLog StealerBrowse
            • 188.114.96.3
            Documento di bonifico bancario intesa Sanpaola 20240613 EUR23750.exeGet hashmaliciousFormBookBrowse
            • 188.114.96.3
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            TESONETLTTicari Siparis Belgesi 26 07 2024 17545000600.exeGet hashmaliciousFormBookBrowse
            • 185.148.106.70
            INVOICE - MV CNC BANGKOK - ST24PJ-278.exeGet hashmaliciousFormBookBrowse
            • 156.67.74.121
            Documento di bonifico bancario intesa Sanpaola 20240613 EUR23750.exeGet hashmaliciousFormBookBrowse
            • 185.148.106.71
            http://www.open-sora.orgGet hashmaliciousExela Stealer, Growtopia, Python StealerBrowse
            • 156.67.75.29
            OPs5j7Yjb8.elfGet hashmaliciousGafgyt, MiraiBrowse
            • 156.67.72.41
            52cMXV8Al2.elfGet hashmaliciousMiraiBrowse
            • 156.67.72.45
            mips.elfGet hashmaliciousMirai, MoobotBrowse
            • 195.158.206.227
            TAVMCtVXa5.exeGet hashmaliciousUnknownBrowse
            • 156.67.72.10
            kn328E7C2B.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, SmokeLoader, StealcBrowse
            • 156.67.71.68
            #U0111#U01a1n h#U00e0ng m#U1edbi pdf.exeGet hashmaliciousFormBookBrowse
            • 156.67.71.229
            CLOUDFLARENETUSVessel Particulars.exeGet hashmaliciousSnake KeyloggerBrowse
            • 188.114.96.3
            DHL Shipment Documents_1338078651.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
            • 188.114.97.3
            DHL AirWayBill.pif.exeGet hashmaliciousSnake KeyloggerBrowse
            • 188.114.96.3
            DHL Shipment Doc.exeGet hashmaliciousAgentTeslaBrowse
            • 104.26.13.205
            Bank Slip.xlsGet hashmaliciousUnknownBrowse
            • 172.67.162.208
            Bank Slip.xlsGet hashmaliciousUnknownBrowse
            • 172.67.162.208
            invoice727282_PDF..exeGet hashmaliciousAgentTeslaBrowse
            • 172.67.74.152
            HBL-08082024-RELEASE.xlsGet hashmaliciousUnknownBrowse
            • 172.67.162.208
            DHL_AWB#6078538091.exeGet hashmaliciousFormBookBrowse
            • 172.67.195.73
            Bank Slip.xlsGet hashmaliciousUnknownBrowse
            • 172.67.162.208
            HWCSNETHuaweiCloudServicedatacenterCNunLc6VekkL.elfGet hashmaliciousMiraiBrowse
            • 121.36.93.241
            Tomcat.bin.exeGet hashmaliciousUnknownBrowse
            • 124.70.37.167
            b4cbf3ffbd8e152116e72487c3b16f1d.exeGet hashmaliciousUnknownBrowse
            • 124.70.37.167
            Tomcat.bin.exeGet hashmaliciousUnknownBrowse
            • 124.70.37.167
            b4cbf3ffbd8e152116e72487c3b16f1d.exeGet hashmaliciousUnknownBrowse
            • 124.70.37.167
            Tomcat.bin.exeGet hashmaliciousUnknownBrowse
            • 124.70.37.167
            1I9EGoBq.exeGet hashmaliciousUnknownBrowse
            • 124.70.37.167
            Tomcat.bin.exeGet hashmaliciousUnknownBrowse
            • 124.70.37.167
            1I9EGoBq.exeGet hashmaliciousUnknownBrowse
            • 124.70.37.167
            SecuriteInfo.com.Win32.Evo-gen.1535.2335.exeGet hashmaliciousSupershellBrowse
            • 121.36.248.151
            No context
            No context
            Process:C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):1216
            Entropy (8bit):5.34331486778365
            Encrypted:false
            SSDEEP:24:ML9E4KiE4Kx1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MxHKiHKx1qHiYHKh3oPtHo6hAHKze0HJ
            MD5:8B21C0FDF91680677FEFC8890882FD1F
            SHA1:E15AC7685BFC89F63015C29DE7F6BCE7A1A9F0E7
            SHA-256:E2F188397C73C8150EE6F09E833E4D1ABA01293CCFDFED61981F5F66660731F9
            SHA-512:1EFDF56115A8688CA2380F3047A28CA3E03C74369C3A377050066A56B8171AD756F7DD7AA29F5648A84D16812D1B422749259ED47447713E9B3A0834CE361BE7
            Malicious:true
            Reputation:moderate, very likely benign file
            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            File Type:data
            Category:dropped
            Size (bytes):1172
            Entropy (8bit):5.356731422178564
            Encrypted:false
            SSDEEP:24:3CytZWSKco4KmZjKbmOIKod6emN1s4RP09tEoUEJ0gt/NKIl9iagu:yyjWSU4xympjms4Rc9tEoUl8NDv
            MD5:480203CD49438F23FB257730E22AB496
            SHA1:B1A553D2251E16878277A7D246D1944073E9D3D6
            SHA-256:6476EE14832C3738B8D1BB4BF5CB6C9E967F37DFE286D7184BC097E4532FC6B7
            SHA-512:010F9CECA85C766BA599B648C74A13F928AD88D5DF9F8D2A4CF080DB14B4B6FC7D155D66AD489F6DFC48F17532FB82348B954F8446040944455C37955FE47A0D
            Malicious:false
            Reputation:low
            Preview:@...e.................................^..............@..........P................1]...E...........(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<...............V.}...@...i...........System.Transactions.8..................1...L..U;V.<}........System.Numerics.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            File Type:ASCII text, with no line terminators
            Category:dropped
            Size (bytes):60
            Entropy (8bit):4.038920595031593
            Encrypted:false
            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
            MD5:D17FE0A3F47BE24A6453E9EF58C94641
            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
            Malicious:false
            Reputation:high, very likely benign file
            Preview:# PowerShell test file to determine AppLocker lockdown mode
            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            File Type:ASCII text, with no line terminators
            Category:dropped
            Size (bytes):60
            Entropy (8bit):4.038920595031593
            Encrypted:false
            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
            MD5:D17FE0A3F47BE24A6453E9EF58C94641
            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
            Malicious:false
            Preview:# PowerShell test file to determine AppLocker lockdown mode
            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            File Type:ASCII text, with no line terminators
            Category:dropped
            Size (bytes):60
            Entropy (8bit):4.038920595031593
            Encrypted:false
            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
            MD5:D17FE0A3F47BE24A6453E9EF58C94641
            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
            Malicious:false
            Preview:# PowerShell test file to determine AppLocker lockdown mode
            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            File Type:ASCII text, with no line terminators
            Category:dropped
            Size (bytes):60
            Entropy (8bit):4.038920595031593
            Encrypted:false
            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
            MD5:D17FE0A3F47BE24A6453E9EF58C94641
            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
            Malicious:false
            Preview:# PowerShell test file to determine AppLocker lockdown mode
            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Entropy (8bit):7.857886206893674
            TrID:
            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            • Win32 Executable (generic) a (10002005/4) 49.78%
            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
            • Generic Win/DOS Executable (2004/3) 0.01%
            • DOS Executable Generic (2002/1) 0.01%
            File name:Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe
            File size:789'504 bytes
            MD5:15cc82dce96d6980e2dc800b10a81495
            SHA1:005a539c30f4a640457dcd8b047278e8a93dd61b
            SHA256:7d39dde72383a557950523dfc9e5a64718323fcebf5d41aba286763c9ae7b39e
            SHA512:5ceaf03a2187dd14f793d278730f17b5a4fe907d57a319fb512fc6ad686e49d06d9f6d57b98261b54c2c37397f4b0661c954cea2f07acccb560a51f82d6921e3
            SSDEEP:12288:l8RMecnVV0TWQwZnBLhDqV/NX7WsfuyP1S3dktl8IfWoK811zF2JraZlJCjWcRQc:+43NdsVpWUQatlPlcJclJtcu
            TLSH:5DF401493680AC9FC65F8D3E89612C409B71E166560FE353B89736FC588E3E68E413E7
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....9.f..............0......$......n.... ... ....@.. ....................................@................................
            Icon Hash:6d52d2adc7a9a944
            Entrypoint:0x4c056e
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Time Stamp:0x66B439B5 [Thu Aug 8 03:21:25 2024 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
            Instruction
            jmp dword ptr [00402000h]
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0xc05180x53.text
            IMAGE_DIRECTORY_ENTRY_RESOURCE0xc20000x2158.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0xc60000xc.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x20000xbe5740xbe6009c88d65fbeaec9c1a224690b32470facFalse0.8987978598982271Hitachi SH little-endian COFF executable, no relocation info, stripped, 12 sections, symbol offset=0x48, 327682 symbols, optional header size 56967.8646973020800965IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rsrc0xc20000x21580x2200d4177ce5b36c2f2801c579d54624d391False0.8836167279411765data7.4086789574410306IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0xc60000xc0x200d19d0fff50418b1e0e6fe9d638e0167bFalse0.041015625data0.07763316234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_ICON0xc20e80x1d49PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9618514072295585
            RT_GROUP_ICON0xc3e340x14data1.05
            RT_VERSION0xc3e480x310data0.4375
            DLLImport
            mscoree.dll_CorExeMain
            TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
            2024-08-09T09:23:41.928739+0200TCP2031453ET MALWARE FormBook CnC Checkin (GET)15015280192.168.2.6188.114.96.3
            2024-08-09T09:23:06.633806+0200TCP2031453ET MALWARE FormBook CnC Checkin (GET)15014980192.168.2.6119.3.37.137
            2024-08-09T09:22:41.789121+0200TCP2031453ET MALWARE FormBook CnC Checkin (GET)15014680192.168.2.6185.148.106.70
            TimestampSource PortDest PortSource IPDest IP
            Aug 9, 2024 09:22:41.316875935 CEST5014680192.168.2.6185.148.106.70
            Aug 9, 2024 09:22:41.322092056 CEST8050146185.148.106.70192.168.2.6
            Aug 9, 2024 09:22:41.322318077 CEST5014680192.168.2.6185.148.106.70
            Aug 9, 2024 09:22:41.322381973 CEST5014680192.168.2.6185.148.106.70
            Aug 9, 2024 09:22:41.327379942 CEST8050146185.148.106.70192.168.2.6
            Aug 9, 2024 09:22:41.788503885 CEST8050146185.148.106.70192.168.2.6
            Aug 9, 2024 09:22:41.788662910 CEST5014680192.168.2.6185.148.106.70
            Aug 9, 2024 09:22:41.789066076 CEST8050146185.148.106.70192.168.2.6
            Aug 9, 2024 09:22:41.789120913 CEST5014680192.168.2.6185.148.106.70
            Aug 9, 2024 09:22:41.793857098 CEST8050146185.148.106.70192.168.2.6
            Aug 9, 2024 09:23:02.614479065 CEST5014980192.168.2.6119.3.37.137
            Aug 9, 2024 09:23:02.619443893 CEST8050149119.3.37.137192.168.2.6
            Aug 9, 2024 09:23:02.619560957 CEST5014980192.168.2.6119.3.37.137
            Aug 9, 2024 09:23:02.619622946 CEST5014980192.168.2.6119.3.37.137
            Aug 9, 2024 09:23:02.626486063 CEST8050149119.3.37.137192.168.2.6
            Aug 9, 2024 09:23:03.118621111 CEST5014980192.168.2.6119.3.37.137
            Aug 9, 2024 09:23:03.167359114 CEST8050149119.3.37.137192.168.2.6
            Aug 9, 2024 09:23:06.633038998 CEST8050149119.3.37.137192.168.2.6
            Aug 9, 2024 09:23:06.633805990 CEST5014980192.168.2.6119.3.37.137
            Aug 9, 2024 09:23:41.412947893 CEST5015280192.168.2.6188.114.96.3
            Aug 9, 2024 09:23:41.417874098 CEST8050152188.114.96.3192.168.2.6
            Aug 9, 2024 09:23:41.418183088 CEST5015280192.168.2.6188.114.96.3
            Aug 9, 2024 09:23:41.418183088 CEST5015280192.168.2.6188.114.96.3
            Aug 9, 2024 09:23:41.423177958 CEST8050152188.114.96.3192.168.2.6
            Aug 9, 2024 09:23:41.921128035 CEST5015280192.168.2.6188.114.96.3
            Aug 9, 2024 09:23:41.928667068 CEST8050152188.114.96.3192.168.2.6
            Aug 9, 2024 09:23:41.928739071 CEST5015280192.168.2.6188.114.96.3
            TimestampSource PortDest PortSource IPDest IP
            Aug 9, 2024 09:22:14.522846937 CEST53583001.1.1.1192.168.2.6
            Aug 9, 2024 09:22:40.985940933 CEST5253053192.168.2.61.1.1.1
            Aug 9, 2024 09:22:41.306299925 CEST53525301.1.1.1192.168.2.6
            Aug 9, 2024 09:23:01.546960115 CEST5964453192.168.2.61.1.1.1
            Aug 9, 2024 09:23:02.561712980 CEST5964453192.168.2.61.1.1.1
            Aug 9, 2024 09:23:02.613589048 CEST53596441.1.1.1192.168.2.6
            Aug 9, 2024 09:23:02.614260912 CEST53596441.1.1.1192.168.2.6
            Aug 9, 2024 09:23:21.109503031 CEST6180453192.168.2.61.1.1.1
            Aug 9, 2024 09:23:21.275454998 CEST53618041.1.1.1192.168.2.6
            Aug 9, 2024 09:23:41.240724087 CEST5305353192.168.2.61.1.1.1
            Aug 9, 2024 09:23:41.411881924 CEST53530531.1.1.1192.168.2.6
            Aug 9, 2024 09:24:04.187411070 CEST6161153192.168.2.61.1.1.1
            Aug 9, 2024 09:24:04.938110113 CEST53616111.1.1.1192.168.2.6
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Aug 9, 2024 09:22:40.985940933 CEST192.168.2.61.1.1.10x201eStandard query (0)www.loyalbahis356.comA (IP address)IN (0x0001)false
            Aug 9, 2024 09:23:01.546960115 CEST192.168.2.61.1.1.10x16c6Standard query (0)www.guangdongqiangzhetc.comA (IP address)IN (0x0001)false
            Aug 9, 2024 09:23:02.561712980 CEST192.168.2.61.1.1.10x16c6Standard query (0)www.guangdongqiangzhetc.comA (IP address)IN (0x0001)false
            Aug 9, 2024 09:23:21.109503031 CEST192.168.2.61.1.1.10x2414Standard query (0)www.nuevobajonfavorito.comA (IP address)IN (0x0001)false
            Aug 9, 2024 09:23:41.240724087 CEST192.168.2.61.1.1.10x115aStandard query (0)www.jnhdh8827.comA (IP address)IN (0x0001)false
            Aug 9, 2024 09:24:04.187411070 CEST192.168.2.61.1.1.10x1854Standard query (0)www.ma-google.comA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Aug 9, 2024 09:22:41.306299925 CEST1.1.1.1192.168.2.60x201eNo error (0)www.loyalbahis356.com185.148.106.70A (IP address)IN (0x0001)false
            Aug 9, 2024 09:22:41.306299925 CEST1.1.1.1192.168.2.60x201eNo error (0)www.loyalbahis356.com185.148.106.71A (IP address)IN (0x0001)false
            Aug 9, 2024 09:23:02.613589048 CEST1.1.1.1192.168.2.60x16c6No error (0)www.guangdongqiangzhetc.comwww-guangdongqiangzhetc-com.258fuwu.comCNAME (Canonical name)IN (0x0001)false
            Aug 9, 2024 09:23:02.613589048 CEST1.1.1.1192.168.2.60x16c6No error (0)www-guangdongqiangzhetc-com.258fuwu.com119.3.37.137A (IP address)IN (0x0001)false
            Aug 9, 2024 09:23:02.614260912 CEST1.1.1.1192.168.2.60x16c6No error (0)www.guangdongqiangzhetc.comwww-guangdongqiangzhetc-com.258fuwu.comCNAME (Canonical name)IN (0x0001)false
            Aug 9, 2024 09:23:02.614260912 CEST1.1.1.1192.168.2.60x16c6No error (0)www-guangdongqiangzhetc-com.258fuwu.com119.3.37.137A (IP address)IN (0x0001)false
            Aug 9, 2024 09:23:21.275454998 CEST1.1.1.1192.168.2.60x2414Name error (3)www.nuevobajonfavorito.comnonenoneA (IP address)IN (0x0001)false
            Aug 9, 2024 09:23:41.411881924 CEST1.1.1.1192.168.2.60x115aNo error (0)www.jnhdh8827.com188.114.96.3A (IP address)IN (0x0001)false
            Aug 9, 2024 09:23:41.411881924 CEST1.1.1.1192.168.2.60x115aNo error (0)www.jnhdh8827.com188.114.97.3A (IP address)IN (0x0001)false
            Aug 9, 2024 09:24:04.938110113 CEST1.1.1.1192.168.2.60x1854Name error (3)www.ma-google.comnonenoneA (IP address)IN (0x0001)false
            • www.loyalbahis356.com
            • www.guangdongqiangzhetc.com
            • www.jnhdh8827.com
            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            0192.168.2.650146185.148.106.70804004C:\Windows\explorer.exe
            TimestampBytes transferredDirectionData
            Aug 9, 2024 09:22:41.322381973 CEST184OUTGET /pz12/?tX9tN=1bMtYrqh7B54XFQP&uTm4D=mhHbh1AUgvkDqhcxvrHPgmJxw//lx/+38lrQrf/b9xTaJsLm+Z3/RBaY9L5MXxl4E5aW6imDag== HTTP/1.1
            Host: www.loyalbahis356.com
            Connection: close
            Data Raw: 00 00 00 00 00 00 00
            Data Ascii:
            Aug 9, 2024 09:22:41.788503885 CEST930INHTTP/1.1 301 Moved Permanently
            Date: Fri, 09 Aug 2024 07:22:41 GMT
            Content-Type: text/html
            Content-Length: 167
            Connection: close
            Cache-Control: max-age=3600
            Expires: Fri, 09 Aug 2024 08:22:41 GMT
            Location: https://loyalbahis356.com/pz12/?tX9tN=1bMtYrqh7B54XFQP&uTm4D=mhHbh1AUgvkDqhcxvrHPgmJxw//lx/+38lrQrf/b9xTaJsLm+Z3/RBaY9L5MXxl4E5aW6imDag==
            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=JQYYGGU%2BwiGxJNJjbWlFtWhw39bwypDDT2jOnW4Qe4JORIKLeo6IfRbCA7jkuWM25un2yLuILdXJaCuWlwceRmGzajP2mZVaCwC821lYC09HFikiiy17kdYmDRQxHX16gdRDmEjbA9c%3D"}],"group":"cf-nel","max_age":604800}
            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
            Server: cloudflare
            CF-RAY: 8b05ff1adb930f45-EWR
            alt-svc: h3=":443"; ma=86400
            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 63 6c 6f 75 64 66 6c 61 72 65 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
            Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>cloudflare</center></body></html>


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            1192.168.2.650149119.3.37.137804004C:\Windows\explorer.exe
            TimestampBytes transferredDirectionData
            Aug 9, 2024 09:23:02.619622946 CEST190OUTGET /pz12/?uTm4D=rT/73z/FHFKsO0wYdmnc3t2OPINEEa6kIjITgDoEX6ai3/vo6h3AOPFXSKl3lYmsmBcXMl/3wg==&tX9tN=1bMtYrqh7B54XFQP HTTP/1.1
            Host: www.guangdongqiangzhetc.com
            Connection: close
            Data Raw: 00 00 00 00 00 00 00
            Data Ascii:


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            2192.168.2.650152188.114.96.3804004C:\Windows\explorer.exe
            TimestampBytes transferredDirectionData
            Aug 9, 2024 09:23:41.418183088 CEST180OUTGET /pz12/?uTm4D=tXrQrgXPfQCqrAqcdoT/KCxiftMWx+uc6jO1VE/0fl1BeE1n2goaTZbQHXHyD6os1JO7aTrmdA==&tX9tN=1bMtYrqh7B54XFQP HTTP/1.1
            Host: www.jnhdh8827.com
            Connection: close
            Data Raw: 00 00 00 00 00 00 00
            Data Ascii:


            Code Manipulations

            Function NameHook TypeActive in Processes
            PeekMessageAINLINEexplorer.exe
            PeekMessageWINLINEexplorer.exe
            GetMessageWINLINEexplorer.exe
            GetMessageAINLINEexplorer.exe
            Function NameHook TypeNew Data
            PeekMessageAINLINE0x48 0x8B 0xB8 0x82 0x2E 0xE8
            PeekMessageWINLINE0x48 0x8B 0xB8 0x8A 0xAE 0xE8
            GetMessageWINLINE0x48 0x8B 0xB8 0x8A 0xAE 0xE8
            GetMessageAINLINE0x48 0x8B 0xB8 0x82 0x2E 0xE8

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:03:21:53
            Start date:09/08/2024
            Path:C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe"
            Imagebase:0x9c0000
            File size:789'504 bytes
            MD5 hash:15CC82DCE96D6980E2DC800B10A81495
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.2171913312.00000000048BA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000000.00000002.2171913312.00000000048BA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000000.00000002.2171913312.00000000048BA000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.2171913312.00000000048BA000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.2171913312.00000000048BA000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
            Reputation:low
            Has exited:true

            Target ID:3
            Start time:03:21:58
            Start date:09/08/2024
            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            Wow64 process (32bit):true
            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe"
            Imagebase:0xfa0000
            File size:433'152 bytes
            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:4
            Start time:03:21:58
            Start date:09/08/2024
            Path:C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe"
            Imagebase:0x760000
            File size:789'504 bytes
            MD5 hash:15CC82DCE96D6980E2DC800B10A81495
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000002.2227875031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.2227875031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000004.00000002.2227875031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000002.2227875031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000002.2227875031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
            Reputation:low
            Has exited:true

            Target ID:5
            Start time:03:21:58
            Start date:09/08/2024
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff66e660000
            File size:862'208 bytes
            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:6
            Start time:03:21:58
            Start date:09/08/2024
            Path:C:\Windows\explorer.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\Explorer.EXE
            Imagebase:0x7ff609140000
            File size:5'141'208 bytes
            MD5 hash:662F4F92FDE3557E86D110526BB578D5
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: Windows_Trojan_Formbook_772cc62d, Description: unknown, Source: 00000006.00000002.3376444530.00000000115A7000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
            Reputation:high
            Has exited:false

            Target ID:7
            Start time:03:22:02
            Start date:09/08/2024
            Path:C:\Windows\SysWOW64\colorcpl.exe
            Wow64 process (32bit):true
            Commandline:"C:\Windows\SysWOW64\colorcpl.exe"
            Imagebase:0x8f0000
            File size:86'528 bytes
            MD5 hash:DB71E132EBF1FEB6E93E8A2A0F0C903D
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000002.3351494869.0000000003650000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.3351494869.0000000003650000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000007.00000002.3351494869.0000000003650000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000002.3351494869.0000000003650000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000002.3351494869.0000000003650000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000002.3349619553.0000000003520000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.3349619553.0000000003520000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000007.00000002.3349619553.0000000003520000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000002.3349619553.0000000003520000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000002.3349619553.0000000003520000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
            Reputation:moderate
            Has exited:false

            Target ID:8
            Start time:03:22:06
            Start date:09/08/2024
            Path:C:\Windows\SysWOW64\cmd.exe
            Wow64 process (32bit):true
            Commandline:/c del "C:\Users\user\Desktop\Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.exe"
            Imagebase:0x1c0000
            File size:236'544 bytes
            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:9
            Start time:03:22:06
            Start date:09/08/2024
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff66e660000
            File size:862'208 bytes
            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Reset < >

              Execution Graph

              Execution Coverage:8.4%
              Dynamic/Decrypted Code Coverage:100%
              Signature Coverage:4.6%
              Total number of Nodes:263
              Total number of Limit Nodes:18
              execution_graph 34928 1229b20 34930 1229b47 34928->34930 34929 1229c24 34930->34929 34932 122977c 34930->34932 34933 122abb0 CreateActCtxA 34932->34933 34935 122ac73 34933->34935 34936 a2a28f8 34938 a2a28fa 34936->34938 34937 a2a2a83 34938->34937 34941 a2a2b78 PostMessageW 34938->34941 34943 a2a2b70 34938->34943 34942 a2a2be4 34941->34942 34942->34938 34944 a2a2b78 PostMessageW 34943->34944 34945 a2a2be4 34944->34945 34945->34938 34946 122feb0 34950 5340006 34946->34950 34960 5340040 34946->34960 34947 122febf 34951 5340034 34950->34951 34953 5340074 34951->34953 34958 5340006 3 API calls 34951->34958 34959 5340040 3 API calls 34951->34959 34952 534005c 34952->34953 34970 53402c9 34952->34970 34953->34947 34955 5340278 GetModuleHandleW 34956 53402a5 34955->34956 34956->34947 34958->34952 34959->34952 34961 5340051 34960->34961 34963 5340074 34960->34963 34968 5340006 3 API calls 34961->34968 34969 5340040 3 API calls 34961->34969 34962 534005c 34962->34963 34967 53402c9 2 API calls 34962->34967 34963->34947 34964 534006c 34964->34963 34965 5340278 GetModuleHandleW 34964->34965 34966 53402a5 34965->34966 34966->34947 34967->34964 34968->34962 34969->34962 34971 53402cc 34970->34971 34972 534006c 34971->34972 34975 53408b0 34971->34975 34979 53408b8 34971->34979 34972->34953 34972->34955 34977 53408b4 LoadLibraryExW 34975->34977 34978 5340931 34977->34978 34978->34972 34980 5340900 LoadLibraryExW 34979->34980 34981 53408fa 34979->34981 34982 5340931 34980->34982 34981->34980 34982->34972 34983 53426e0 34984 5342726 GetCurrentProcess 34983->34984 34986 5342771 34984->34986 34987 5342778 GetCurrentThread 34984->34987 34986->34987 34988 53427b5 GetCurrentProcess 34987->34988 34989 53427ae 34987->34989 34990 53427eb 34988->34990 34989->34988 34991 5342813 GetCurrentThreadId 34990->34991 34992 5342844 34991->34992 35062 5342ed0 35063 5342ef8 35062->35063 35065 5342f20 35063->35065 35066 53422dc 35063->35066 35065->35065 35067 53422e7 35066->35067 35071 5344cd0 35067->35071 35076 5344ce8 35067->35076 35068 5342fc9 35068->35065 35073 5344cdc 35071->35073 35072 5344d25 35072->35068 35073->35072 35082 5345b40 35073->35082 35086 5345b2f 35073->35086 35078 5344e19 35076->35078 35079 5344d19 35076->35079 35077 5344d25 35077->35068 35078->35068 35079->35077 35080 5345b40 CreateWindowExW 35079->35080 35081 5345b2f CreateWindowExW 35079->35081 35080->35078 35081->35078 35083 5345b42 35082->35083 35084 5345c1a 35083->35084 35090 5346a64 35083->35090 35087 5345b34 35086->35087 35088 5345c1a 35087->35088 35089 5346a64 CreateWindowExW 35087->35089 35089->35088 35092 5346a68 35090->35092 35091 5346a4b 35091->35084 35092->35091 35093 5346b33 CreateWindowExW 35092->35093 35094 5346b94 35093->35094 35094->35094 35122 a2a07dc 35123 a2a074a 35122->35123 35124 a2a07e6 35122->35124 35128 a2a16df 35124->35128 35140 a2a16e0 35124->35140 35125 a2a09a0 35129 a2a16fa 35128->35129 35137 a2a1702 35129->35137 35152 a2a1c4d 35129->35152 35156 a2a226f 35129->35156 35161 a2a204e 35129->35161 35166 a2a1bd9 35129->35166 35170 a2a246b 35129->35170 35175 a2a237b 35129->35175 35178 a2a1d6b 35129->35178 35183 a2a1e16 35129->35183 35187 a2a1fb6 35129->35187 35137->35125 35141 a2a16fa 35140->35141 35142 a2a1d6b 2 API calls 35141->35142 35143 a2a237b VirtualAllocEx 35141->35143 35144 a2a246b 2 API calls 35141->35144 35145 a2a1bd9 2 API calls 35141->35145 35146 a2a204e 2 API calls 35141->35146 35147 a2a226f 2 API calls 35141->35147 35148 a2a1702 35141->35148 35149 a2a1c4d 2 API calls 35141->35149 35150 a2a1fb6 2 API calls 35141->35150 35151 a2a1e16 2 API calls 35141->35151 35142->35148 35143->35148 35144->35148 35145->35148 35146->35148 35147->35148 35148->35125 35149->35148 35150->35148 35151->35148 35192 a2a0040 35152->35192 35196 a2a0006 35152->35196 35153 a2a1c7b 35153->35137 35158 a2a1f05 35156->35158 35157 a2a255a 35158->35156 35158->35157 35200 a2a0128 35158->35200 35204 a2a0130 35158->35204 35162 a2a2052 35161->35162 35208 538fea9 35162->35208 35212 538feb0 35162->35212 35163 a2a206d 35163->35137 35216 a2a02c8 35166->35216 35220 a2a02bc 35166->35220 35171 a2a2474 35170->35171 35173 a2a0040 WriteProcessMemory 35171->35173 35174 a2a0006 WriteProcessMemory 35171->35174 35172 a2a25c2 35173->35172 35174->35172 35225 534ff20 35175->35225 35179 a2a1d86 35178->35179 35180 a2a206d 35179->35180 35181 538fea9 Wow64SetThreadContext 35179->35181 35182 538feb0 Wow64SetThreadContext 35179->35182 35180->35137 35181->35180 35182->35180 35184 a2a1e1c 35183->35184 35185 a2a0040 WriteProcessMemory 35184->35185 35186 a2a0006 WriteProcessMemory 35184->35186 35185->35184 35186->35184 35188 a2a2515 35187->35188 35229 a2a27e8 35188->35229 35234 a2a27e7 35188->35234 35189 a2a252e 35193 a2a0088 WriteProcessMemory 35192->35193 35195 a2a00df 35193->35195 35195->35153 35197 a2a0088 WriteProcessMemory 35196->35197 35199 a2a00df 35197->35199 35199->35153 35201 a2a0130 ReadProcessMemory 35200->35201 35203 a2a01bf 35201->35203 35203->35158 35205 a2a0137 ReadProcessMemory 35204->35205 35207 a2a01bf 35205->35207 35207->35158 35209 538feb0 Wow64SetThreadContext 35208->35209 35211 538ff3d 35209->35211 35211->35163 35213 538fef5 Wow64SetThreadContext 35212->35213 35215 538ff3d 35213->35215 35215->35163 35217 a2a02cf 35216->35217 35217->35217 35218 a2a04b6 CreateProcessA 35217->35218 35219 a2a0513 35218->35219 35221 a2a025d 35220->35221 35222 a2a02c2 35220->35222 35222->35222 35223 a2a04b6 CreateProcessA 35222->35223 35224 a2a0513 35223->35224 35226 534ff60 VirtualAllocEx 35225->35226 35228 534ff9d 35226->35228 35230 a2a27fd 35229->35230 35232 538fea9 Wow64SetThreadContext 35230->35232 35233 538feb0 Wow64SetThreadContext 35230->35233 35231 a2a2813 35231->35189 35232->35231 35233->35231 35235 a2a27fd 35234->35235 35237 538fea9 Wow64SetThreadContext 35235->35237 35238 538feb0 Wow64SetThreadContext 35235->35238 35236 a2a2813 35236->35189 35237->35236 35238->35236 34993 104d01c 34994 104d034 34993->34994 34995 104d08e 34994->34995 35000 534442c 34994->35000 35008 5346c1b 34994->35008 35012 5346c28 34994->35012 35016 5347988 34994->35016 35001 5344437 35000->35001 35002 53479f9 35001->35002 35004 53479e9 35001->35004 35034 5344554 35002->35034 35024 5347f28 35004->35024 35029 5347f18 35004->35029 35005 53479f7 35005->35005 35009 5346c24 35008->35009 35010 534442c 2 API calls 35009->35010 35011 5346c6f 35010->35011 35011->34995 35013 5346c4e 35012->35013 35014 534442c 2 API calls 35013->35014 35015 5346c6f 35014->35015 35015->34995 35019 534798c 35016->35019 35017 53479f9 35018 5344554 2 API calls 35017->35018 35021 53479f7 35018->35021 35019->35017 35020 53479e9 35019->35020 35022 5347f28 2 API calls 35020->35022 35023 5347f18 2 API calls 35020->35023 35021->35021 35022->35021 35023->35021 35026 5347f3c 35024->35026 35025 5347fc8 35025->35005 35041 5347fe0 35026->35041 35044 5347fd0 35026->35044 35031 5347f1c 35029->35031 35030 5347fc8 35030->35005 35032 5347fe0 2 API calls 35031->35032 35033 5347fd0 2 API calls 35031->35033 35032->35030 35033->35030 35035 534455f 35034->35035 35036 5349212 35035->35036 35037 53492bc 35035->35037 35039 534926a CallWindowProcW 35036->35039 35040 5349219 35036->35040 35038 534442c CallWindowProcW 35037->35038 35038->35040 35039->35040 35040->35005 35042 5347ff1 35041->35042 35048 53491a3 35041->35048 35042->35025 35045 5347fdc 35044->35045 35046 5347ff1 35045->35046 35047 53491a3 2 API calls 35045->35047 35046->35025 35047->35046 35049 53491ac 35048->35049 35050 5344554 CallWindowProcW 35049->35050 35051 53491b6 35050->35051 35058 5344554 CallWindowProcW 35051->35058 35059 53491a3 CallWindowProcW 35051->35059 35052 53491ba 35052->35042 35053 5349212 35052->35053 35054 53492bc 35052->35054 35056 534926a CallWindowProcW 35053->35056 35057 5349219 35053->35057 35055 534442c CallWindowProcW 35054->35055 35055->35057 35056->35057 35057->35042 35058->35052 35059->35052 35239 538e640 35240 538e66b 35239->35240 35241 538e664 35239->35241 35245 538e692 35240->35245 35246 538e244 35240->35246 35244 538e244 GetCurrentThreadId 35244->35245 35247 538e24f 35246->35247 35248 538e9af GetCurrentThreadId 35247->35248 35249 538e688 35247->35249 35248->35249 35249->35244 35095 1220848 35097 122085c 35095->35097 35096 12208bc 35097->35096 35100 1224197 35097->35100 35105 12240df 35097->35105 35101 12241a4 35100->35101 35102 1224332 35101->35102 35110 1224b80 35101->35110 35114 1224b70 35101->35114 35102->35097 35106 12240e8 35105->35106 35107 1224332 35106->35107 35108 1224b70 NtQueryInformationProcess 35106->35108 35109 1224b80 NtQueryInformationProcess 35106->35109 35107->35097 35108->35106 35109->35106 35111 1224bb2 35110->35111 35113 1224c49 35111->35113 35118 12207d4 35111->35118 35113->35101 35115 1224b7e 35114->35115 35116 12207d4 NtQueryInformationProcess 35115->35116 35117 1224c49 35115->35117 35116->35115 35117->35101 35119 1224d10 NtQueryInformationProcess 35118->35119 35121 1224d9e 35119->35121 35121->35111 35250 12255d8 35252 12255f3 35250->35252 35254 1220820 35252->35254 35258 122082c 35252->35258 35255 1225958 OutputDebugStringW 35254->35255 35257 12259d7 35255->35257 35257->35252 35259 1225a08 FindCloseChangeNotification 35258->35259 35261 1225a76 35259->35261 35261->35252 35060 5342928 DuplicateHandle 35061 53429be 35060->35061
              APIs
              • NtQueryInformationProcess.NTDLL(?,00000000,?,?,?), ref: 01224D8F
              Memory Dump Source
              • Source File: 00000000.00000002.2159987302.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1220000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: InformationProcessQuery
              • String ID:
              • API String ID: 1778838933-0
              • Opcode ID: a6a7adffbf2f74868997de3395e6032c2b3d822cecd309e1dbcf14c0e90f2e33
              • Instruction ID: c1cd1766871964b034233a649b09c291ddb0721a892094ce5fa8d4fbedc51220
              • Opcode Fuzzy Hash: a6a7adffbf2f74868997de3395e6032c2b3d822cecd309e1dbcf14c0e90f2e33
              • Instruction Fuzzy Hash: 7521D0B5900359AFCB10DF9AD884BDEBBF4FF48310F10842AE958A7210D375A954CFA4
              APIs
              • NtQueryInformationProcess.NTDLL(?,00000000,?,?,?), ref: 01224D8F
              Memory Dump Source
              • Source File: 00000000.00000002.2159987302.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1220000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: InformationProcessQuery
              • String ID:
              • API String ID: 1778838933-0
              • Opcode ID: 2f859c68a3945ce0966e53f7f546624dcc9e99bbe2b4cecfd53a58559bc75e78
              • Instruction ID: c7e465366d9a49f15ca61195941b10976dde9e5223527ce43e57123ee3dd325a
              • Opcode Fuzzy Hash: 2f859c68a3945ce0966e53f7f546624dcc9e99bbe2b4cecfd53a58559bc75e78
              • Instruction Fuzzy Hash: F721EFB6900359AFCB10DF9AD884ADEBBF4FF48310F10842AE958A7210D375A654CFA4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2159987302.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1220000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: &NTP
              • API String ID: 0-1805993616
              • Opcode ID: a1a40b2c14e17ec006bc143babe4dacae44290e763f4919d8704ecec64c7c129
              • Instruction ID: 661451738da9fc313ea3a1371d599d9ac7ef8fc0d4ad0dfb42546d42269f9f37
              • Opcode Fuzzy Hash: a1a40b2c14e17ec006bc143babe4dacae44290e763f4919d8704ecec64c7c129
              • Instruction Fuzzy Hash: E3510330B35266DBD7689B7CE9116BE75E7AFC4200B50893AD206CB394DEB5CC018B52
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2159987302.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1220000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: &NTP
              • API String ID: 0-1805993616
              • Opcode ID: d7d577bdbe2b0fcad1b979fbad72f76c80962a0745526d989933cf2e476d0677
              • Instruction ID: 8307e38e4b69621f7866bf85e0e255f406c15e275db525a77b976ac50ab523f9
              • Opcode Fuzzy Hash: d7d577bdbe2b0fcad1b979fbad72f76c80962a0745526d989933cf2e476d0677
              • Instruction Fuzzy Hash: 6D511630B34266EFD7689B78E9116BE75E3BFC5240B54887AD206CB294DEB5CC018B42
              Memory Dump Source
              • Source File: 00000000.00000002.2174696903.0000000005340000.00000040.00000800.00020000.00000000.sdmp, Offset: 05340000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5340000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e735359f7eaaccfd75287eff7d08bc26bb3c1d9d19ead0889c71023bbe4091e7
              • Instruction ID: 0a5faad7be6461d7142fedf1eb8c3c8cde6980de7fad795d1f33c79f04bf2302
              • Opcode Fuzzy Hash: e735359f7eaaccfd75287eff7d08bc26bb3c1d9d19ead0889c71023bbe4091e7
              • Instruction Fuzzy Hash: 5DA15F74E0031A9FCB04DFA5D8949EEBBFAFF89300F558615E516AB2A0DB70A941CF50
              Memory Dump Source
              • Source File: 00000000.00000002.2174696903.0000000005340000.00000040.00000800.00020000.00000000.sdmp, Offset: 05340000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5340000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e8ad168ac92b232b9a7604f8162a1d4b3e11fd4f8cfd1ad6ae93d8f537c332e1
              • Instruction ID: d6087d7480802e0d8a3451326cb6bcfc4bfbe19eca48c30227aa7fad7c7605e1
              • Opcode Fuzzy Hash: e8ad168ac92b232b9a7604f8162a1d4b3e11fd4f8cfd1ad6ae93d8f537c332e1
              • Instruction Fuzzy Hash: 0B919035E0031A9FCB04DFA1D8549EDFBFAFF8A300B558615E516AB2A4DB70A981CF50
              Memory Dump Source
              • Source File: 00000000.00000002.2159987302.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1220000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 245e550606b47a9feeea40906a44506f949ea614de46c1180cb4e90b4627e337
              • Instruction ID: a7b4d2140f71a02e8d3b19bf4587da2907b46ee0b9102e62e0ca9a32b5cf066f
              • Opcode Fuzzy Hash: 245e550606b47a9feeea40906a44506f949ea614de46c1180cb4e90b4627e337
              • Instruction Fuzzy Hash: EF713775F242919FC7058F74C8926EEBFB1FF8A300B14449ED581DF261C6395A12CB81
              Memory Dump Source
              • Source File: 00000000.00000002.2159987302.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1220000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d50cbe78e8047ea6a62f297829074ebb66f5b251fa1d09d86edb3137d5ed3720
              • Instruction ID: 220c6a7fa4635a6b5d589c916c0ebe419d0f9154376a92ce849ec0b179c2a2ea
              • Opcode Fuzzy Hash: d50cbe78e8047ea6a62f297829074ebb66f5b251fa1d09d86edb3137d5ed3720
              • Instruction Fuzzy Hash: 7D41B774F241669FD704CFA9C995A7FBAB6FF88300F10402AD505EB394CA798E118B91
              Memory Dump Source
              • Source File: 00000000.00000002.2159987302.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1220000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6a51eff3f8eb62d16de89d81d7c86d5f9a3a790399ad75b09b0579cc54e34b5e
              • Instruction ID: efd511cbe23ebefbe0fe5e701011a9b8589aa01918bb54155e86a49d06e508b2
              • Opcode Fuzzy Hash: 6a51eff3f8eb62d16de89d81d7c86d5f9a3a790399ad75b09b0579cc54e34b5e
              • Instruction Fuzzy Hash: 5941F631B24756EBC719EFB4C89019DF7B6FFD9300B148A2AE505EB600EF70A9458791
              Memory Dump Source
              • Source File: 00000000.00000002.2159987302.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1220000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f8befe0df6fffb0b4882196923c3404fc9ebf177f7ea34be5336618a1412be93
              • Instruction ID: 46fd0b524043def28ec4278bccab394578662b9156ec509db92bac940d613beb
              • Opcode Fuzzy Hash: f8befe0df6fffb0b4882196923c3404fc9ebf177f7ea34be5336618a1412be93
              • Instruction Fuzzy Hash: 4F412931B247569BC719EFB4C8901ADF7B6FFD9300B14862AE506AB600DF70AD458791

              Control-flow Graph

              APIs
              • GetCurrentProcess.KERNEL32 ref: 0534275E
              • GetCurrentThread.KERNEL32 ref: 0534279B
              • GetCurrentProcess.KERNEL32 ref: 053427D8
              • GetCurrentThreadId.KERNEL32 ref: 05342831
              Memory Dump Source
              • Source File: 00000000.00000002.2174696903.0000000005340000.00000040.00000800.00020000.00000000.sdmp, Offset: 05340000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5340000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: Current$ProcessThread
              • String ID:
              • API String ID: 2063062207-0
              • Opcode ID: 8b0ef29a6e37cc7923c5dd15a3cd577d22459585638081bfe48a7557c7bd68bb
              • Instruction ID: 188af87a8ec5c87c3703cfb3648f7970763f91e48afb207bd3f51cd90206fb0f
              • Opcode Fuzzy Hash: 8b0ef29a6e37cc7923c5dd15a3cd577d22459585638081bfe48a7557c7bd68bb
              • Instruction Fuzzy Hash: 135165B49003498FEB14CFAAD588BEEBFF1BF88314F208559E449A7261DB746944CF61

              Control-flow Graph

              APIs
              • GetCurrentProcess.KERNEL32 ref: 0534275E
              • GetCurrentThread.KERNEL32 ref: 0534279B
              • GetCurrentProcess.KERNEL32 ref: 053427D8
              • GetCurrentThreadId.KERNEL32 ref: 05342831
              Memory Dump Source
              • Source File: 00000000.00000002.2174696903.0000000005340000.00000040.00000800.00020000.00000000.sdmp, Offset: 05340000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5340000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: Current$ProcessThread
              • String ID:
              • API String ID: 2063062207-0
              • Opcode ID: 0434994d4e74292fccdf5a37597b6c0c981e9c6b39f274770fab8fb0a9d09752
              • Instruction ID: 8ef7d8bbab6cd8d2f5e531951a45fb615018d6d7bdca474571eeb66dfc608682
              • Opcode Fuzzy Hash: 0434994d4e74292fccdf5a37597b6c0c981e9c6b39f274770fab8fb0a9d09752
              • Instruction Fuzzy Hash: C65154B4900309CFEB14CFAAD588B9EBBF1BF88314F208569E419A7260DB746944CF65

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 44 a2a02bc-a2a02c0 45 a2a025d 44->45 46 a2a02c2-a2a02c6 44->46 47 a2a025f-a2a0260 45->47 48 a2a0267-a2a0282 45->48 49 a2a02c8-a2a02ce 46->49 50 a2a02cf-a2a035d 46->50 47->48 53 a2a028b-a2a02b0 48->53 54 a2a0284-a2a028a 48->54 49->50 55 a2a035f-a2a0369 50->55 56 a2a0396-a2a03b6 50->56 54->53 55->56 57 a2a036b-a2a036d 55->57 65 a2a03b8-a2a03c2 56->65 66 a2a03ef-a2a041e 56->66 58 a2a036f-a2a0379 57->58 59 a2a0390-a2a0393 57->59 63 a2a037b 58->63 64 a2a037d-a2a038c 58->64 59->56 63->64 64->64 67 a2a038e 64->67 65->66 69 a2a03c4-a2a03c6 65->69 73 a2a0420-a2a042a 66->73 74 a2a0457-a2a0511 CreateProcessA 66->74 67->59 71 a2a03c8-a2a03d2 69->71 72 a2a03e9-a2a03ec 69->72 75 a2a03d6-a2a03e5 71->75 76 a2a03d4 71->76 72->66 73->74 77 a2a042c-a2a042e 73->77 87 a2a051a-a2a05a0 74->87 88 a2a0513-a2a0519 74->88 75->75 78 a2a03e7 75->78 76->75 79 a2a0430-a2a043a 77->79 80 a2a0451-a2a0454 77->80 78->72 82 a2a043e-a2a044d 79->82 83 a2a043c 79->83 80->74 82->82 84 a2a044f 82->84 83->82 84->80 98 a2a05a2-a2a05a6 87->98 99 a2a05b0-a2a05b4 87->99 88->87 98->99 100 a2a05a8 98->100 101 a2a05b6-a2a05ba 99->101 102 a2a05c4-a2a05c8 99->102 100->99 101->102 103 a2a05bc 101->103 104 a2a05ca-a2a05ce 102->104 105 a2a05d8-a2a05dc 102->105 103->102 104->105 106 a2a05d0 104->106 107 a2a05ee-a2a05f5 105->107 108 a2a05de-a2a05e4 105->108 106->105 109 a2a060c 107->109 110 a2a05f7-a2a0606 107->110 108->107 112 a2a060d 109->112 110->109 112->112
              APIs
              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0A2A04FE
              Memory Dump Source
              • Source File: 00000000.00000002.2176507801.000000000A2A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A2A0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a2a0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: CreateProcess
              • String ID:
              • API String ID: 963392458-0
              • Opcode ID: f294ba111c1e0d968233d4d14615e1d80502f3bd1ef1a17459930a72c9f068ab
              • Instruction ID: 36e61596e65869b278704d3ae34136bd8206fd4af101c9f54012cca5dcb3ee98
              • Opcode Fuzzy Hash: f294ba111c1e0d968233d4d14615e1d80502f3bd1ef1a17459930a72c9f068ab
              • Instruction Fuzzy Hash: 66B16A71D1431ADFEB24CFA9C8507EEBBB2BF58310F108569E809A7240DB749A85CF91

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 113 a2a02c8-a2a035d 116 a2a035f-a2a0369 113->116 117 a2a0396-a2a03b6 113->117 116->117 118 a2a036b-a2a036d 116->118 124 a2a03b8-a2a03c2 117->124 125 a2a03ef-a2a041e 117->125 119 a2a036f-a2a0379 118->119 120 a2a0390-a2a0393 118->120 122 a2a037b 119->122 123 a2a037d-a2a038c 119->123 120->117 122->123 123->123 126 a2a038e 123->126 124->125 127 a2a03c4-a2a03c6 124->127 131 a2a0420-a2a042a 125->131 132 a2a0457-a2a0511 CreateProcessA 125->132 126->120 129 a2a03c8-a2a03d2 127->129 130 a2a03e9-a2a03ec 127->130 133 a2a03d6-a2a03e5 129->133 134 a2a03d4 129->134 130->125 131->132 135 a2a042c-a2a042e 131->135 145 a2a051a-a2a05a0 132->145 146 a2a0513-a2a0519 132->146 133->133 136 a2a03e7 133->136 134->133 137 a2a0430-a2a043a 135->137 138 a2a0451-a2a0454 135->138 136->130 140 a2a043e-a2a044d 137->140 141 a2a043c 137->141 138->132 140->140 142 a2a044f 140->142 141->140 142->138 156 a2a05a2-a2a05a6 145->156 157 a2a05b0-a2a05b4 145->157 146->145 156->157 158 a2a05a8 156->158 159 a2a05b6-a2a05ba 157->159 160 a2a05c4-a2a05c8 157->160 158->157 159->160 161 a2a05bc 159->161 162 a2a05ca-a2a05ce 160->162 163 a2a05d8-a2a05dc 160->163 161->160 162->163 164 a2a05d0 162->164 165 a2a05ee-a2a05f5 163->165 166 a2a05de-a2a05e4 163->166 164->163 167 a2a060c 165->167 168 a2a05f7-a2a0606 165->168 166->165 170 a2a060d 167->170 168->167 170->170
              APIs
              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0A2A04FE
              Memory Dump Source
              • Source File: 00000000.00000002.2176507801.000000000A2A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A2A0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a2a0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: CreateProcess
              • String ID:
              • API String ID: 963392458-0
              • Opcode ID: 271468d90ec8fc7986ab43e62c9a1feadddd11176c7a03c284400f4a66b5c4de
              • Instruction ID: f5e06d8d856188948c26ff5d1252658f552b9d5acbcabd663f504d91152b4dd2
              • Opcode Fuzzy Hash: 271468d90ec8fc7986ab43e62c9a1feadddd11176c7a03c284400f4a66b5c4de
              • Instruction Fuzzy Hash: 29915A71D1461ADFDB14CF69C891BAEBBB2BF58310F048169E818A7280DB749A85CF91

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 171 5340040-534004f 172 5340051 171->172 173 534007b-534007f 171->173 224 5340057 call 5340006 172->224 225 5340057 call 5340040 172->225 174 5340081-534008b 173->174 175 5340093-53400d4 173->175 174->175 181 53400d6-53400de 175->181 182 53400e1-53400ef 175->182 176 534005c-534005e 179 5340074 176->179 180 5340060-534006e call 53402c9 176->180 179->173 180->179 189 53401b0-5340270 180->189 181->182 183 53400f1-53400f6 182->183 184 5340113-5340115 182->184 186 5340101 183->186 187 53400f8-53400ff 183->187 188 5340118-534011f 184->188 192 5340103-5340111 186->192 187->192 190 5340121-5340129 188->190 191 534012c-5340133 188->191 216 5340272-5340275 189->216 217 5340278-53402a3 GetModuleHandleW 189->217 190->191 193 5340135-534013d 191->193 194 5340140-5340149 191->194 192->188 193->194 199 5340156-534015b 194->199 200 534014b-5340153 194->200 201 534015d-5340164 199->201 202 5340179-534017d 199->202 200->199 201->202 204 5340166-5340176 201->204 221 5340180 call 53409e0 202->221 222 5340180 call 53409d0 202->222 204->202 205 5340183-5340186 207 5340188-53401a6 205->207 208 53401a9-53401af 205->208 207->208 216->217 218 53402a5-53402ab 217->218 219 53402ac-53402c0 217->219 218->219 221->205 222->205 224->176 225->176
              APIs
              • GetModuleHandleW.KERNELBASE(00000000), ref: 05340296
              Memory Dump Source
              • Source File: 00000000.00000002.2174696903.0000000005340000.00000040.00000800.00020000.00000000.sdmp, Offset: 05340000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5340000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: HandleModule
              • String ID:
              • API String ID: 4139908857-0
              • Opcode ID: fb76f7b6b7ae5bb40e4cb07bda7244878ee6d14c80494457a2f50b0f4a7f7cf5
              • Instruction ID: f0ac5ed74b245268762d7f094891577bc12173eb0fc38aa4be00fdd1ace30f7f
              • Opcode Fuzzy Hash: fb76f7b6b7ae5bb40e4cb07bda7244878ee6d14c80494457a2f50b0f4a7f7cf5
              • Instruction Fuzzy Hash: 41713770A00B458FD728DF6AD5557AABBF1BF88200F008A2DD58ADBA50D7B5F845CF90

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 226 5346a64-5346a66 227 5346a68-5346a69 226->227 228 5346a6a 226->228 227->228 229 5346a4b-5346a50 call 5344400 227->229 230 5346a6e-5346ad6 228->230 231 5346a6b-5346a6c 228->231 234 5346a55-5346a56 229->234 235 5346ae1-5346ae8 230->235 236 5346ad8-5346ade 230->236 231->230 237 5346af3-5346b92 CreateWindowExW 235->237 238 5346aea-5346af0 235->238 236->235 240 5346b94-5346b9a 237->240 241 5346b9b-5346bd3 237->241 238->237 240->241 245 5346bd5-5346bd8 241->245 246 5346be0 241->246 245->246 247 5346be1 246->247 247->247
              APIs
              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05346B82
              Memory Dump Source
              • Source File: 00000000.00000002.2174696903.0000000005340000.00000040.00000800.00020000.00000000.sdmp, Offset: 05340000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5340000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: CreateWindow
              • String ID:
              • API String ID: 716092398-0
              • Opcode ID: 8ee867d66e636157ce518a6988bd0abd0d9a7c4034f3ccb14b85a04a7c79b920
              • Instruction ID: bff2e1ed4adee97c2589468c4f4a36ed2eba1d815e1d49f3e5b21c43219174fb
              • Opcode Fuzzy Hash: 8ee867d66e636157ce518a6988bd0abd0d9a7c4034f3ccb14b85a04a7c79b920
              • Instruction Fuzzy Hash: DC51D2B1D00349DFDB14CF9AC885ADEBBF5BF49310F24816AE819AB210D7B1A955CF90

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 248 5346a70-5346ad6 249 5346ae1-5346ae8 248->249 250 5346ad8-5346ade 248->250 251 5346af3-5346b2b 249->251 252 5346aea-5346af0 249->252 250->249 253 5346b33-5346b92 CreateWindowExW 251->253 252->251 254 5346b94-5346b9a 253->254 255 5346b9b-5346bd3 253->255 254->255 259 5346bd5-5346bd8 255->259 260 5346be0 255->260 259->260 261 5346be1 260->261 261->261
              APIs
              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05346B82
              Memory Dump Source
              • Source File: 00000000.00000002.2174696903.0000000005340000.00000040.00000800.00020000.00000000.sdmp, Offset: 05340000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5340000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: CreateWindow
              • String ID:
              • API String ID: 716092398-0
              • Opcode ID: 9710b16df6957fbfc43e38f1046d3b6fb64de63866f37bff6ef73cb2cdb32bca
              • Instruction ID: 159b5cce23ab67ff7869ae99c2e80baf7397887fc1a286ea4cb654506ed4cc5b
              • Opcode Fuzzy Hash: 9710b16df6957fbfc43e38f1046d3b6fb64de63866f37bff6ef73cb2cdb32bca
              • Instruction Fuzzy Hash: 4641C0B1D00349DFDB14CF9AC985ADEBBF5BF48310F24812AE819AB210D7B1A945CF90

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 262 5344554-534920c 265 5349212-5349217 262->265 266 53492bc-53492dc call 534442c 262->266 268 5349219-5349250 265->268 269 534926a-53492a2 CallWindowProcW 265->269 273 53492df-53492ec 266->273 275 5349252-5349258 268->275 276 5349259-5349268 268->276 270 53492a4-53492aa 269->270 271 53492ab-53492ba 269->271 270->271 271->273 275->276 276->273
              APIs
              • CallWindowProcW.USER32(?,?,?,?,?), ref: 05349291
              Memory Dump Source
              • Source File: 00000000.00000002.2174696903.0000000005340000.00000040.00000800.00020000.00000000.sdmp, Offset: 05340000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5340000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: CallProcWindow
              • String ID:
              • API String ID: 2714655100-0
              • Opcode ID: fa0fa26ee3e307c768155f566fc456da33557f97e9277a63e5dcbd9b1062217f
              • Instruction ID: c593bb22d0efa00f5e7ebe7b984e5284637e694133ab0ef0e6d858f6bc578cbe
              • Opcode Fuzzy Hash: fa0fa26ee3e307c768155f566fc456da33557f97e9277a63e5dcbd9b1062217f
              • Instruction Fuzzy Hash: 1F41F6B5A00209CFDB14CF99C488BABBBF5FF88314F248459D519A7361D775A841CFA0

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 279 122977c-122ac71 CreateActCtxA 282 122ac73-122ac79 279->282 283 122ac7a-122acd4 279->283 282->283 290 122ace3-122ace7 283->290 291 122acd6-122acd9 283->291 292 122acf8 290->292 293 122ace9-122acf5 290->293 291->290 293->292
              APIs
              • CreateActCtxA.KERNEL32(?), ref: 0122AC61
              Memory Dump Source
              • Source File: 00000000.00000002.2159987302.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1220000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: Create
              • String ID:
              • API String ID: 2289755597-0
              • Opcode ID: 984b606e4f7bdc38d9cf578f8b2eb14c0a256ee5ebafc0d63e025c496086f98f
              • Instruction ID: df76e4b450bef887d2999778cbe9381ed7c8d3f0c9a0502ac8e89035c1183888
              • Opcode Fuzzy Hash: 984b606e4f7bdc38d9cf578f8b2eb14c0a256ee5ebafc0d63e025c496086f98f
              • Instruction Fuzzy Hash: 2841E3B0C0071DDBEB24CFA9C944BDEBBB5BF84704F20806AD508AB651DBB56945CF90

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 295 a2a0006-a2a008e 297 a2a009e-a2a00dd WriteProcessMemory 295->297 298 a2a0090-a2a009c 295->298 300 a2a00df-a2a00e5 297->300 301 a2a00e6-a2a0116 297->301 298->297 300->301
              APIs
              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0A2A00D0
              Memory Dump Source
              • Source File: 00000000.00000002.2176507801.000000000A2A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A2A0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a2a0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: MemoryProcessWrite
              • String ID:
              • API String ID: 3559483778-0
              • Opcode ID: 8a0af7f8d4f550dd4cfaaf2d2f7f8c91abd7879eb5f22ed1d1f768e2a62708df
              • Instruction ID: 3ac4fdda58f392f3280704d0198d0ca11bd7d1c5efe237c7fae35b1a69c5d176
              • Opcode Fuzzy Hash: 8a0af7f8d4f550dd4cfaaf2d2f7f8c91abd7879eb5f22ed1d1f768e2a62708df
              • Instruction Fuzzy Hash: 2531897191538A8FDB11CFA9C8807DEBFF0FF4A320F0484AAE954AB251D7789950CB61

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 305 a2a0128-a2a012e 306 a2a0130-a2a0136 305->306 307 a2a0137-a2a01bd ReadProcessMemory 305->307 306->307 310 a2a01bf-a2a01c5 307->310 311 a2a01c6-a2a01f6 307->311 310->311
              APIs
              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0A2A01B0
              Memory Dump Source
              • Source File: 00000000.00000002.2176507801.000000000A2A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A2A0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a2a0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: MemoryProcessRead
              • String ID:
              • API String ID: 1726664587-0
              • Opcode ID: 01475e75ad36d5979cf071cbb8123a706aa5c8c7c662b6dfcab1569cafb25c74
              • Instruction ID: 05b3a367848073b2ce004a945dfcf972f365d36824e40dafe523fb3da5c18d07
              • Opcode Fuzzy Hash: 01475e75ad36d5979cf071cbb8123a706aa5c8c7c662b6dfcab1569cafb25c74
              • Instruction Fuzzy Hash: 1921467180034ADFDB10CFAAC8807EEBBB5FF48310F10842AE558A7241D7799515DBA4

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 315 a2a0040-a2a008e 317 a2a009e-a2a00dd WriteProcessMemory 315->317 318 a2a0090-a2a009c 315->318 320 a2a00df-a2a00e5 317->320 321 a2a00e6-a2a0116 317->321 318->317 320->321
              APIs
              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0A2A00D0
              Memory Dump Source
              • Source File: 00000000.00000002.2176507801.000000000A2A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A2A0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a2a0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: MemoryProcessWrite
              • String ID:
              • API String ID: 3559483778-0
              • Opcode ID: ed319632cccd2fa035e96a72417bae53ea459ce54bd505a5197aeb002eb0cde7
              • Instruction ID: c4c0bb63baa069009643ba4c499fd1b344f3920fd2618ddbfc983d7e7d374ed3
              • Opcode Fuzzy Hash: ed319632cccd2fa035e96a72417bae53ea459ce54bd505a5197aeb002eb0cde7
              • Instruction Fuzzy Hash: 952126719103499FDB10CFAAC881BDEBBF5FF48310F108429E959A7240D7B99954CBA4

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 331 538fea9-538fefb 334 538ff0b-538ff3b Wow64SetThreadContext 331->334 335 538fefd-538ff09 331->335 337 538ff3d-538ff43 334->337 338 538ff44-538ff74 334->338 335->334 337->338
              APIs
              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0538FF2E
              Memory Dump Source
              • Source File: 00000000.00000002.2174832958.0000000005380000.00000040.00000800.00020000.00000000.sdmp, Offset: 05380000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5380000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: ContextThreadWow64
              • String ID:
              • API String ID: 983334009-0
              • Opcode ID: 399c43934013f4887b97f7b3853aca14c40223a09f1343aa8239e1678beadc31
              • Instruction ID: 6ba1d588228411d8a76c79392c29985b6472d0363eed4b5e11325721f3323b63
              • Opcode Fuzzy Hash: 399c43934013f4887b97f7b3853aca14c40223a09f1343aa8239e1678beadc31
              • Instruction Fuzzy Hash: 222157719003098FDB14DFAAC4817AEBBF4AF88324F14842AE519A7240CBB89945CFA0

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 325 5342920-5342926 326 5342928-53429bc DuplicateHandle 325->326 327 53429c5-53429e2 326->327 328 53429be-53429c4 326->328 328->327
              APIs
              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 053429AF
              Memory Dump Source
              • Source File: 00000000.00000002.2174696903.0000000005340000.00000040.00000800.00020000.00000000.sdmp, Offset: 05340000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5340000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: DuplicateHandle
              • String ID:
              • API String ID: 3793708945-0
              • Opcode ID: 062a1d5a14d1e675ffa260fa50e54aa72aab484d70b0ef04aaedcccd7489a740
              • Instruction ID: 52ade4cf555667ec060b82f61c7e911ebde4fde7b9f772e69c716aed559cd875
              • Opcode Fuzzy Hash: 062a1d5a14d1e675ffa260fa50e54aa72aab484d70b0ef04aaedcccd7489a740
              • Instruction Fuzzy Hash: FE21D2B59002099FDB10CFAAD984ADEBBF5FB48320F14801AE958A3350D379A954CFA4
              APIs
              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0A2A01B0
              Memory Dump Source
              • Source File: 00000000.00000002.2176507801.000000000A2A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A2A0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a2a0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: MemoryProcessRead
              • String ID:
              • API String ID: 1726664587-0
              • Opcode ID: 35b4ae3334d1c9f8d77e083b02acb586aed22aba692e8f4418ff6318a1b62573
              • Instruction ID: 1d9934bf146a28b8a65a1f695fe4b00781b09fe4f0016878b72454553915b6ea
              • Opcode Fuzzy Hash: 35b4ae3334d1c9f8d77e083b02acb586aed22aba692e8f4418ff6318a1b62573
              • Instruction Fuzzy Hash: CB2128B18003499FDB10DFAAC881BEEBBF5FF48310F108429E559A7240D7799554DBA5

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 342 538feb0-538fefb 344 538ff0b-538ff3b Wow64SetThreadContext 342->344 345 538fefd-538ff09 342->345 347 538ff3d-538ff43 344->347 348 538ff44-538ff74 344->348 345->344 347->348
              APIs
              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0538FF2E
              Memory Dump Source
              • Source File: 00000000.00000002.2174832958.0000000005380000.00000040.00000800.00020000.00000000.sdmp, Offset: 05380000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5380000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: ContextThreadWow64
              • String ID:
              • API String ID: 983334009-0
              • Opcode ID: 9a366091420e576fb1b1066922ffd8dd100e07ccb7f82fc4b2b7f36cc28acba9
              • Instruction ID: fb46765bd89a46fd98d8b348d7811fdadc154819f5a6ec951c8be1698b61bb4b
              • Opcode Fuzzy Hash: 9a366091420e576fb1b1066922ffd8dd100e07ccb7f82fc4b2b7f36cc28acba9
              • Instruction Fuzzy Hash: 622149719003098FDB14DFAAC4857EEBBF4FF88324F14842AD559A7240DBB89945CFA5
              APIs
              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 053429AF
              Memory Dump Source
              • Source File: 00000000.00000002.2174696903.0000000005340000.00000040.00000800.00020000.00000000.sdmp, Offset: 05340000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5340000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: DuplicateHandle
              • String ID:
              • API String ID: 3793708945-0
              • Opcode ID: 0dfe471e9ccd1421c5e2e18c5f8af99a9ca0222ddaa2892ad4fe26dd02019191
              • Instruction ID: 9f3ee1297efb828b04c900063f65eddd45f6f7727f24c3b78350f205d0579a8e
              • Opcode Fuzzy Hash: 0dfe471e9ccd1421c5e2e18c5f8af99a9ca0222ddaa2892ad4fe26dd02019191
              • Instruction Fuzzy Hash: E621E4B59002099FDB10CFAAD984ADEBFF4FF48320F14801AE958A3310D374A954CFA0
              APIs
              • LoadLibraryExW.KERNELBASE(00000000,?,?), ref: 05340922
              Memory Dump Source
              • Source File: 00000000.00000002.2174696903.0000000005340000.00000040.00000800.00020000.00000000.sdmp, Offset: 05340000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5340000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID:
              • API String ID: 1029625771-0
              • Opcode ID: 30177820787732d55243986866235c023417d04da21b7bb24617d430194c4dd5
              • Instruction ID: 86a171d3f6d13048801fe8d54f7ef05f6c6ca457ae4d92594d652e3453601e2a
              • Opcode Fuzzy Hash: 30177820787732d55243986866235c023417d04da21b7bb24617d430194c4dd5
              • Instruction Fuzzy Hash: 272136B69003499FDB14CFAAC444BDFFBF4AF48310F10841AE559AB210C3B5A545CFA1
              APIs
              • OutputDebugStringW.KERNELBASE(00000000,?,?,?,?,?,24C75EC2,?,012256CC), ref: 012259C8
              Memory Dump Source
              • Source File: 00000000.00000002.2159987302.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1220000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: DebugOutputString
              • String ID:
              • API String ID: 1166629820-0
              • Opcode ID: 1225cfb93076593491cbc3491a0aaa29b2ff0e0b6ca97a1c47061f109e920b8b
              • Instruction ID: 43c85ef09e1a71cbe128c49b004b378436ebabd59a48dee25624ca721f75c5f4
              • Opcode Fuzzy Hash: 1225cfb93076593491cbc3491a0aaa29b2ff0e0b6ca97a1c47061f109e920b8b
              • Instruction Fuzzy Hash: 5A1130B1C0061A9BCB00CF9AC545BDEFBB4FF88320F10811AE918A3200C374A950CFA1
              APIs
              • OutputDebugStringW.KERNELBASE(00000000,?,?,?,?,?,24C75EC2,?,012256CC), ref: 012259C8
              Memory Dump Source
              • Source File: 00000000.00000002.2159987302.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1220000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: DebugOutputString
              • String ID:
              • API String ID: 1166629820-0
              • Opcode ID: 24d66c02416d7d1b617492a62260fc73004d7d8ef6f07423d1ce947ba0ee7af8
              • Instruction ID: 77ab1952cb32a7f067e71e0379f64e5941e91b7aaf5a94ff0b353fe98d00f9a2
              • Opcode Fuzzy Hash: 24d66c02416d7d1b617492a62260fc73004d7d8ef6f07423d1ce947ba0ee7af8
              • Instruction Fuzzy Hash: 2F1133B1D1061A9BCB00CF9AC544BDEFBB4FF48220F10811AE918A7200D374A914CFE1
              APIs
              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0534FF8E
              Memory Dump Source
              • Source File: 00000000.00000002.2174696903.0000000005340000.00000040.00000800.00020000.00000000.sdmp, Offset: 05340000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5340000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: AllocVirtual
              • String ID:
              • API String ID: 4275171209-0
              • Opcode ID: 96c1c2c67ac12230d0adbcd5ed77d1091f57db7b73486ff33ef14e3b32735f0a
              • Instruction ID: 8ef591e42ab4c61414c2dc867bd3cf11be3c9c953e0bfdf4cddf7f612f3457ae
              • Opcode Fuzzy Hash: 96c1c2c67ac12230d0adbcd5ed77d1091f57db7b73486ff33ef14e3b32735f0a
              • Instruction Fuzzy Hash: F01156728002499FDB10DFAAC845BDFBBF5EF88320F148419E519A7250C775A550CFA0
              APIs
              • LoadLibraryExW.KERNELBASE(00000000,?,?), ref: 05340922
              Memory Dump Source
              • Source File: 00000000.00000002.2174696903.0000000005340000.00000040.00000800.00020000.00000000.sdmp, Offset: 05340000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5340000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID:
              • API String ID: 1029625771-0
              • Opcode ID: 02bc35282ee3262f5965b47ba00619f8236870bad01149571bfd0cdbe59eede3
              • Instruction ID: c43791240d1fb254d035e9b6de9be5e095a4f6067a00e19ee391c411efec7c77
              • Opcode Fuzzy Hash: 02bc35282ee3262f5965b47ba00619f8236870bad01149571bfd0cdbe59eede3
              • Instruction Fuzzy Hash: FE11F3B69003499FDB14CFAAD544BDEFBF4BF88320F10842AE559A7210C3B5A545CFA5
              APIs
              • PostMessageW.USER32(?,?,?,?), ref: 0A2A2BD5
              Memory Dump Source
              • Source File: 00000000.00000002.2176507801.000000000A2A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A2A0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a2a0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: MessagePost
              • String ID:
              • API String ID: 410705778-0
              • Opcode ID: d1af7d2bd9723ba617806a80f9a4f0da4dcb5a5086bc72b3c917bc0382e8d85e
              • Instruction ID: fb452ca9666cb6bf197e5de3f8b96037c9dd6a327804b111f4f7549cd25e586d
              • Opcode Fuzzy Hash: d1af7d2bd9723ba617806a80f9a4f0da4dcb5a5086bc72b3c917bc0382e8d85e
              • Instruction Fuzzy Hash: 031123B6804249DFDB10CF9AC545BDEBBF8EB48324F20881AD558A7210C3B9A544CFA5
              APIs
              • FindCloseChangeNotification.KERNELBASE(00000000), ref: 01225A67
              Memory Dump Source
              • Source File: 00000000.00000002.2159987302.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1220000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: ChangeCloseFindNotification
              • String ID:
              • API String ID: 2591292051-0
              • Opcode ID: 0de189bf59dc2ebfc2075e45cfd1952a504bfb33c984751adc09917e1fd14929
              • Instruction ID: 78027ff11afae2e814bf13ff2a4023f3c4543b111aaea55090e66dd638d48b46
              • Opcode Fuzzy Hash: 0de189bf59dc2ebfc2075e45cfd1952a504bfb33c984751adc09917e1fd14929
              • Instruction Fuzzy Hash: 231128B1810359CFDB10DF9AC585BEEBBF4EF48320F108469D558A3251D7B8A944CFA5
              APIs
              • FindCloseChangeNotification.KERNELBASE(00000000), ref: 01225A67
              Memory Dump Source
              • Source File: 00000000.00000002.2159987302.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1220000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: ChangeCloseFindNotification
              • String ID:
              • API String ID: 2591292051-0
              • Opcode ID: c84ee0bc5517fe0a863e7f1dffee0f9b98d2758d8a4618b0c6372fd46b8e5eb9
              • Instruction ID: 56e2c13de7b44c203fa1fc3c113c17f2d8191b35a6520751c3f388b58ed6fc11
              • Opcode Fuzzy Hash: c84ee0bc5517fe0a863e7f1dffee0f9b98d2758d8a4618b0c6372fd46b8e5eb9
              • Instruction Fuzzy Hash: F51113B180035ACFDB10DF9AC585BEEBBF4AF48320F24845AD558A3350D7B8A944CBA5
              APIs
              • PostMessageW.USER32(?,?,?,?), ref: 0A2A2BD5
              Memory Dump Source
              • Source File: 00000000.00000002.2176507801.000000000A2A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A2A0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a2a0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: MessagePost
              • String ID:
              • API String ID: 410705778-0
              • Opcode ID: cab99921b2343848aa1293c2b19912b0cba9a2a9772c981ce6d70bbf5fcee565
              • Instruction ID: a440c7d3cb931e13b2b56a90a14c923ffbc65e23c39bbd8c88b37d1bd1ac628d
              • Opcode Fuzzy Hash: cab99921b2343848aa1293c2b19912b0cba9a2a9772c981ce6d70bbf5fcee565
              • Instruction Fuzzy Hash: 6D11F2B5800349DFDB10CF9AC985BDEBBF8EB48320F108419E558A7210C3B9A544CFA1
              Memory Dump Source
              • Source File: 00000000.00000002.2159419003.000000000103D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0103D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_103d000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 377b3b56baa57e20584ec582bce197891d3a18fb0242e25e6cf942639433f105
              • Instruction ID: 12d54bea9b4d17b62d67903e762f22226d80f10407ab7243bf028436c2759e3d
              • Opcode Fuzzy Hash: 377b3b56baa57e20584ec582bce197891d3a18fb0242e25e6cf942639433f105
              • Instruction Fuzzy Hash: C2213672100200EFDB05DF94D9C0B6ABFA9FBC4320F60C5A9E9890B256C736E456CBA1
              Memory Dump Source
              • Source File: 00000000.00000002.2159468132.000000000104D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0104D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_104d000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fb66e7ef3710bef5a4c2bca16b0652e686c97f2fae707c240e209ae78cf36a66
              • Instruction ID: 4ec943502fc921aceb108e183394be8b3f909235431c209b6557dcb589a8e8eb
              • Opcode Fuzzy Hash: fb66e7ef3710bef5a4c2bca16b0652e686c97f2fae707c240e209ae78cf36a66
              • Instruction Fuzzy Hash: 6F2137B1604200EFDB05DF94D6C0B29BBA1FBA4324F20C6BDE9894B252C376D406CB61
              Memory Dump Source
              • Source File: 00000000.00000002.2159468132.000000000104D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0104D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_104d000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b0e698bbb3f0eb91daafcac0a32abeb0c63fef8a4303254e1af6209e2fc9181a
              • Instruction ID: c54564b030f47836320438a7165a81e1cf117770907b879bac2da1ce6b821b58
              • Opcode Fuzzy Hash: b0e698bbb3f0eb91daafcac0a32abeb0c63fef8a4303254e1af6209e2fc9181a
              • Instruction Fuzzy Hash: 4A2100B5604200EFDB15DF94D9C0B2ABBA1EB94314F20C5BDE98A0B252C37AD406CB61
              Memory Dump Source
              • Source File: 00000000.00000002.2159468132.000000000104D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0104D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_104d000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c73f0914433524c90f7c6582340915f80a6d54043174a48cfd5a4d9527fee3b2
              • Instruction ID: 3f9d9d722d3c2490d890d4e888e227d97e6b971b11ee85ecab4b87c51018e5a1
              • Opcode Fuzzy Hash: c73f0914433524c90f7c6582340915f80a6d54043174a48cfd5a4d9527fee3b2
              • Instruction Fuzzy Hash: 6F2180B55083809FCB02CF54D9D4711BFB1EB46214F28C5EAD8898B2A7C33AD806CB62
              Memory Dump Source
              • Source File: 00000000.00000002.2159419003.000000000103D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0103D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_103d000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
              • Instruction ID: 62cbf289aab3b1aac400be89d744fb1295ba434d7d2a385c3739ab4369f71de1
              • Opcode Fuzzy Hash: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
              • Instruction Fuzzy Hash: CC110076404280DFCB02CF44D9C0B56BFB2FB84324F24C6A9D8490B657C33AE45ACBA2
              Memory Dump Source
              • Source File: 00000000.00000002.2159468132.000000000104D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0104D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_104d000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
              • Instruction ID: a16f92caa8204eb0a14f28afb9cfe7439a85bdd583559a22b56896bb6b157bbb
              • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
              • Instruction Fuzzy Hash: 5311BBB5504280DFCB02DF54C6C4B15BBA1FB94224F24C6A9D8894B2A6C33AD40ACB61
              Memory Dump Source
              • Source File: 00000000.00000002.2174832958.0000000005380000.00000040.00000800.00020000.00000000.sdmp, Offset: 05380000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5380000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5f62c3d6901436f5ddf82c66d2a0531eeccd464c11b08b67236639b51f4a3336
              • Instruction ID: 6691665de9c0edff3e98d53d6c278b8a9d2fe7b73c7264f8becd4478d867202e
              • Opcode Fuzzy Hash: 5f62c3d6901436f5ddf82c66d2a0531eeccd464c11b08b67236639b51f4a3336
              • Instruction Fuzzy Hash: 57524C34A003568FCB14DF28C844B99B7B2FF89314F2586A9D5586F3A1DBB1AD86CF41
              Memory Dump Source
              • Source File: 00000000.00000002.2174832958.0000000005380000.00000040.00000800.00020000.00000000.sdmp, Offset: 05380000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5380000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a154a40c8d952cc40d8c9d9a3c58082073e46b9c777cfa42f3ff0b4d9e615521
              • Instruction ID: c0f160ac1597255791e0f1551ff0e28dc9321781874caa631a37036a11aa8a68
              • Opcode Fuzzy Hash: a154a40c8d952cc40d8c9d9a3c58082073e46b9c777cfa42f3ff0b4d9e615521
              • Instruction Fuzzy Hash: 2A525D34A003568FCB14DF28C844B99B7B2FF85314F2586A9D5586F3A2DBB1A986CF41
              Memory Dump Source
              • Source File: 00000000.00000002.2176507801.000000000A2A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A2A0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a2a0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3b0e44ee2072f851e16384992cd1799dafb8847fd8e84f99d01e471322530a77
              • Instruction ID: 8e156405f9633845fa2f38bd634d3deb3238415d71c51426d05be316d78af1a0
              • Opcode Fuzzy Hash: 3b0e44ee2072f851e16384992cd1799dafb8847fd8e84f99d01e471322530a77
              • Instruction Fuzzy Hash: 28D1DB71B20215AFDB29DB75C920B6FB7E6AF98700F18447AD146CB391DB34E802CB91
              Memory Dump Source
              • Source File: 00000000.00000002.2174696903.0000000005340000.00000040.00000800.00020000.00000000.sdmp, Offset: 05340000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5340000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f96cd58424eb099ca4738d47fd60d40756b586c7f667c0aa069d83e0bb76b645
              • Instruction ID: 7e3feea2fbfc8c1e972408c879f63459d9f28c8c5efc6559260286a46083883c
              • Opcode Fuzzy Hash: f96cd58424eb099ca4738d47fd60d40756b586c7f667c0aa069d83e0bb76b645
              • Instruction Fuzzy Hash: 3F12D0B1C857869BE710CF25F8889893BB1F745328BD44B08D2652B3D1D7F91AAACF44
              Memory Dump Source
              • Source File: 00000000.00000002.2176507801.000000000A2A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A2A0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a2a0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 85dd5d9b75361f8d768cfe7a879efb170c243d011f21fb891e39ed045f8ee787
              • Instruction ID: e6c1319719766a6bc3ae613da7a94cb8ecb9c67bea8e78f5207286b9b38f8fb3
              • Opcode Fuzzy Hash: 85dd5d9b75361f8d768cfe7a879efb170c243d011f21fb891e39ed045f8ee787
              • Instruction Fuzzy Hash: C3D1D234A10605CFDB18DF69C598AA9B7F1BF8D705F2680A8E506AB361DB71ED40CF60
              Memory Dump Source
              • Source File: 00000000.00000002.2174696903.0000000005340000.00000040.00000800.00020000.00000000.sdmp, Offset: 05340000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5340000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 19685545af635bdd4727664a51bd58587908faef66b287f28f8f92afd0467987
              • Instruction ID: a4abbb011bfd15c29cc5349ee9e36210ab2250b953c492ba4fb2ca3e3783656e
              • Opcode Fuzzy Hash: 19685545af635bdd4727664a51bd58587908faef66b287f28f8f92afd0467987
              • Instruction Fuzzy Hash: 0CA15C32E002198FCF09DFA5D844AAEB7F2FF84301B15857AE906AB261DB71E915CF40
              Memory Dump Source
              • Source File: 00000000.00000002.2174696903.0000000005340000.00000040.00000800.00020000.00000000.sdmp, Offset: 05340000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5340000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 88eebf410d91235c5abbb459a0133f894104082908edfe3dc9c7a9c13383831a
              • Instruction ID: c3c2cc74e92a341bf16a306000bb1c82af8af8e318d785a78de40bbb8073a000
              • Opcode Fuzzy Hash: 88eebf410d91235c5abbb459a0133f894104082908edfe3dc9c7a9c13383831a
              • Instruction Fuzzy Hash: 5BC135B1C817868BD710DF25F8889897BB1FB85324F944B08D2612B3D1D7F81AAACF44
              Memory Dump Source
              • Source File: 00000000.00000002.2159987302.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1220000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3cc26a9a1eb28a63df67051168c03a70900902e37c818e8e49756ba575d114c4
              • Instruction ID: 058b906ceb15e5e241c8081437fc8d1c348241c79dd3a6e31077bee245b78af8
              • Opcode Fuzzy Hash: 3cc26a9a1eb28a63df67051168c03a70900902e37c818e8e49756ba575d114c4
              • Instruction Fuzzy Hash: B1414872B2432AAFCB11CE18C88217EBBB5FF9D300B4945A7E544CB251D678DA51C792
              Memory Dump Source
              • Source File: 00000000.00000002.2159987302.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1220000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d8961875a3ad1a713106f13243d1e1b4543ffd0845ef996d189445a2eb05cf12
              • Instruction ID: 1a25e70c494fcb45c5c494a8bcdcdff99d0abea40bc89d97b5fbe989a3b02182
              • Opcode Fuzzy Hash: d8961875a3ad1a713106f13243d1e1b4543ffd0845ef996d189445a2eb05cf12
              • Instruction Fuzzy Hash: FA41AF71F342699FDF04CF68C8869AEBBB5FB8C600B158966D405EB351D678D900CB91
              Memory Dump Source
              • Source File: 00000000.00000002.2159987302.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1220000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1dc7c2f987b9e2bcf3c5e9f51e9c13b9d181e5a774344016168166883b72113e
              • Instruction ID: 41b7a70b3e5fdb51fa7ad4ac60e815a5d004e8aa31948b68b66c957f4a1eaf6f
              • Opcode Fuzzy Hash: 1dc7c2f987b9e2bcf3c5e9f51e9c13b9d181e5a774344016168166883b72113e
              • Instruction Fuzzy Hash: D8419F71F341699FDF04CFA9C88696EBBF5FB8C600B158926D405EB350D678D900CB91

              Execution Graph

              Execution Coverage:1.3%
              Dynamic/Decrypted Code Coverage:2.7%
              Signature Coverage:1.4%
              Total number of Nodes:556
              Total number of Limit Nodes:70
              execution_graph 99440 41f120 99443 41b970 99440->99443 99444 41b996 99443->99444 99451 409d40 99444->99451 99446 41b9a2 99447 41b9c3 99446->99447 99459 40c1c0 99446->99459 99449 41b9b5 99495 41a6b0 99449->99495 99498 409c90 99451->99498 99453 409d54 99453->99446 99454 409d4d 99454->99453 99510 409c30 99454->99510 99460 40c1e5 99459->99460 99928 40b1c0 99460->99928 99462 40c23c 99932 40ae40 99462->99932 99464 40c262 99494 40c4b3 99464->99494 99941 4143a0 99464->99941 99466 40c2a7 99466->99494 99944 408a60 99466->99944 99468 40c2eb 99468->99494 99951 41a500 99468->99951 99472 40c348 99475 41bdc0 2 API calls 99472->99475 99473 40c341 99473->99472 99963 41a010 99473->99963 99477 40c355 99475->99477 99477->99449 99478 40c392 99479 41bdc0 2 API calls 99478->99479 99480 40c399 99479->99480 99480->99449 99481 40c3a2 99482 40f4a0 3 API calls 99481->99482 99483 40c416 99482->99483 99483->99472 99484 40c421 99483->99484 99485 41bdc0 2 API calls 99484->99485 99486 40c445 99485->99486 99968 41a060 99486->99968 99489 41a010 2 API calls 99490 40c480 99489->99490 99490->99494 99973 419e20 99490->99973 99493 41a6b0 2 API calls 99493->99494 99494->99449 99496 41af60 LdrLoadDll 99495->99496 99497 41a6cf ExitProcess 99496->99497 99497->99447 99499 409ca3 99498->99499 99549 418bc0 LdrLoadDll 99498->99549 99529 418a70 99499->99529 99502 409cb6 99502->99454 99503 409cac 99503->99502 99532 41b2b0 99503->99532 99505 409cf3 99505->99502 99543 409ab0 99505->99543 99507 409d13 99550 409620 LdrLoadDll 99507->99550 99509 409d25 99509->99454 99511 409c4a 99510->99511 99512 41b5a0 LdrLoadDll 99510->99512 99903 41b5a0 99511->99903 99512->99511 99515 41b5a0 LdrLoadDll 99516 409c71 99515->99516 99517 40f180 99516->99517 99518 40f199 99517->99518 99911 40b040 99518->99911 99520 40f1ac 99915 41a1e0 99520->99915 99523 409d65 99523->99446 99525 40f1d2 99526 40f1fd 99525->99526 99921 41a260 99525->99921 99528 41a490 2 API calls 99526->99528 99528->99523 99551 41a600 99529->99551 99533 41b2c9 99532->99533 99565 414a50 99533->99565 99535 41b2e1 99536 41b2ea 99535->99536 99604 41b0f0 99535->99604 99536->99505 99538 41b2fe 99538->99536 99622 419f00 99538->99622 99881 407ea0 99543->99881 99545 409ad1 99545->99507 99546 409aca 99546->99545 99894 408160 99546->99894 99549->99499 99550->99509 99552 41a616 99551->99552 99555 41af60 99552->99555 99554 418a85 99554->99503 99556 41af70 99555->99556 99558 41af92 99555->99558 99559 414e50 99556->99559 99558->99554 99560 414e6a 99559->99560 99561 414e5e 99559->99561 99560->99558 99561->99560 99564 4152d0 LdrLoadDll 99561->99564 99563 414fbc 99563->99558 99564->99563 99566 414d85 99565->99566 99577 414a64 99565->99577 99566->99535 99569 414b90 99634 41a360 99569->99634 99570 414b73 99691 41a460 LdrLoadDll 99570->99691 99573 414bb7 99575 41bdc0 2 API calls 99573->99575 99574 414b7d 99574->99535 99576 414bc3 99575->99576 99576->99574 99578 414d49 99576->99578 99579 414d5f 99576->99579 99584 414c52 99576->99584 99577->99566 99631 419c50 99577->99631 99580 41a490 2 API calls 99578->99580 99700 414790 LdrLoadDll NtReadFile NtClose 99579->99700 99583 414d50 99580->99583 99582 414d72 99582->99535 99583->99535 99585 414cb9 99584->99585 99587 414c61 99584->99587 99585->99578 99586 414ccc 99585->99586 99693 41a2e0 99586->99693 99589 414c66 99587->99589 99590 414c7a 99587->99590 99692 414650 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk 99589->99692 99593 414c97 99590->99593 99594 414c7f 99590->99594 99593->99583 99649 414410 99593->99649 99637 4146f0 99594->99637 99596 414c70 99596->99535 99599 414d2c 99697 41a490 99599->99697 99600 414c8d 99600->99535 99601 414caf 99601->99535 99603 414d38 99603->99535 99606 41b101 99604->99606 99605 41b113 99605->99538 99606->99605 99718 41bd40 99606->99718 99608 41b134 99611 41b157 99608->99611 99721 414070 99608->99721 99610 41b180 99610->99538 99611->99610 99612 414070 3 API calls 99611->99612 99615 41b179 99612->99615 99614 41b20a 99616 41b21a 99614->99616 99847 41af00 LdrLoadDll 99614->99847 99615->99610 99753 415390 99615->99753 99763 41ad70 99616->99763 99619 41b248 99842 419ec0 99619->99842 99623 419f0c 99622->99623 99624 41af60 LdrLoadDll 99623->99624 99625 419f1c 99624->99625 99875 1222c0a 99625->99875 99626 419f37 99628 41bdc0 99626->99628 99878 41a670 99628->99878 99630 41b359 99630->99505 99632 414b44 99631->99632 99633 41af60 LdrLoadDll 99631->99633 99632->99569 99632->99570 99632->99574 99633->99632 99635 41a37c NtCreateFile 99634->99635 99636 41af60 LdrLoadDll 99634->99636 99635->99573 99636->99635 99638 41470c 99637->99638 99639 41a2e0 LdrLoadDll 99638->99639 99640 41472d 99639->99640 99641 414734 99640->99641 99642 414748 99640->99642 99643 41a490 2 API calls 99641->99643 99644 41a490 2 API calls 99642->99644 99645 41473d 99643->99645 99646 414751 99644->99646 99645->99600 99701 41bfd0 LdrLoadDll RtlAllocateHeap 99646->99701 99648 41475c 99648->99600 99650 41445b 99649->99650 99651 41448e 99649->99651 99652 41a2e0 LdrLoadDll 99650->99652 99653 4145d9 99651->99653 99658 4144aa 99651->99658 99654 414476 99652->99654 99655 41a2e0 LdrLoadDll 99653->99655 99656 41a490 2 API calls 99654->99656 99657 4145f4 99655->99657 99659 41447f 99656->99659 99714 41a320 LdrLoadDll 99657->99714 99660 41a2e0 LdrLoadDll 99658->99660 99659->99601 99661 4144c5 99660->99661 99662 4144e1 99661->99662 99663 4144cc 99661->99663 99667 4144e6 99662->99667 99668 4144fc 99662->99668 99666 41a490 2 API calls 99663->99666 99665 41462e 99669 41a490 2 API calls 99665->99669 99670 4144d5 99666->99670 99671 41a490 2 API calls 99667->99671 99677 414501 99668->99677 99702 41bf90 99668->99702 99672 414639 99669->99672 99670->99601 99673 4144ef 99671->99673 99672->99601 99673->99601 99676 414567 99678 41457e 99676->99678 99713 41a2a0 LdrLoadDll 99676->99713 99684 414513 99677->99684 99705 41a410 99677->99705 99680 414585 99678->99680 99681 41459a 99678->99681 99682 41a490 2 API calls 99680->99682 99683 41a490 2 API calls 99681->99683 99682->99684 99685 4145a3 99683->99685 99684->99601 99686 4145cf 99685->99686 99708 41bb90 99685->99708 99686->99601 99688 4145ba 99689 41bdc0 2 API calls 99688->99689 99690 4145c3 99689->99690 99690->99601 99691->99574 99692->99596 99694 414d14 99693->99694 99695 41af60 LdrLoadDll 99693->99695 99696 41a320 LdrLoadDll 99694->99696 99695->99694 99696->99599 99698 41af60 LdrLoadDll 99697->99698 99699 41a4ac NtClose 99698->99699 99699->99603 99700->99582 99701->99648 99704 41bfa8 99702->99704 99715 41a630 99702->99715 99704->99677 99706 41a42c NtReadFile 99705->99706 99707 41af60 LdrLoadDll 99705->99707 99706->99676 99707->99706 99709 41bbb4 99708->99709 99710 41bb9d 99708->99710 99709->99688 99710->99709 99711 41bf90 2 API calls 99710->99711 99712 41bbcb 99711->99712 99712->99688 99713->99678 99714->99665 99716 41af60 LdrLoadDll 99715->99716 99717 41a64c RtlAllocateHeap 99716->99717 99717->99704 99848 41a540 99718->99848 99720 41bd6d 99720->99608 99722 414081 99721->99722 99723 414089 99721->99723 99722->99611 99752 41435c 99723->99752 99851 41cf30 99723->99851 99725 4140dd 99726 41cf30 2 API calls 99725->99726 99729 4140e8 99726->99729 99727 414136 99730 41cf30 2 API calls 99727->99730 99729->99727 99731 41d060 3 API calls 99729->99731 99862 41cfd0 LdrLoadDll RtlAllocateHeap RtlFreeHeap 99729->99862 99733 41414a 99730->99733 99731->99729 99732 4141a7 99734 41cf30 2 API calls 99732->99734 99733->99732 99856 41d060 99733->99856 99738 4141bd 99734->99738 99736 4141fa 99737 41cf30 2 API calls 99736->99737 99739 414205 99737->99739 99738->99736 99740 41d060 3 API calls 99738->99740 99741 41d060 3 API calls 99739->99741 99747 41423f 99739->99747 99740->99738 99741->99739 99743 414334 99864 41cf90 LdrLoadDll RtlFreeHeap 99743->99864 99745 41433e 99865 41cf90 LdrLoadDll RtlFreeHeap 99745->99865 99863 41cf90 LdrLoadDll RtlFreeHeap 99747->99863 99748 414348 99866 41cf90 LdrLoadDll RtlFreeHeap 99748->99866 99750 414352 99867 41cf90 LdrLoadDll RtlFreeHeap 99750->99867 99752->99611 99754 4153a1 99753->99754 99755 414a50 8 API calls 99754->99755 99756 4153b7 99755->99756 99757 4153f2 99756->99757 99758 415405 99756->99758 99762 41540a 99756->99762 99759 41bdc0 2 API calls 99757->99759 99760 41bdc0 2 API calls 99758->99760 99761 4153f7 99759->99761 99760->99762 99761->99614 99762->99614 99764 41ad84 99763->99764 99765 41ac30 LdrLoadDll 99763->99765 99868 41ac30 99764->99868 99765->99764 99767 41ad8d 99768 41ac30 LdrLoadDll 99767->99768 99769 41ad96 99768->99769 99770 41ac30 LdrLoadDll 99769->99770 99771 41ad9f 99770->99771 99772 41ac30 LdrLoadDll 99771->99772 99773 41ada8 99772->99773 99774 41ac30 LdrLoadDll 99773->99774 99775 41adb1 99774->99775 99776 41ac30 LdrLoadDll 99775->99776 99777 41adbd 99776->99777 99778 41ac30 LdrLoadDll 99777->99778 99779 41adc6 99778->99779 99780 41ac30 LdrLoadDll 99779->99780 99781 41adcf 99780->99781 99782 41ac30 LdrLoadDll 99781->99782 99783 41add8 99782->99783 99784 41ac30 LdrLoadDll 99783->99784 99785 41ade1 99784->99785 99786 41ac30 LdrLoadDll 99785->99786 99787 41adea 99786->99787 99788 41ac30 LdrLoadDll 99787->99788 99789 41adf6 99788->99789 99790 41ac30 LdrLoadDll 99789->99790 99791 41adff 99790->99791 99792 41ac30 LdrLoadDll 99791->99792 99793 41ae08 99792->99793 99794 41ac30 LdrLoadDll 99793->99794 99795 41ae11 99794->99795 99796 41ac30 LdrLoadDll 99795->99796 99797 41ae1a 99796->99797 99798 41ac30 LdrLoadDll 99797->99798 99799 41ae23 99798->99799 99800 41ac30 LdrLoadDll 99799->99800 99801 41ae2f 99800->99801 99802 41ac30 LdrLoadDll 99801->99802 99803 41ae38 99802->99803 99804 41ac30 LdrLoadDll 99803->99804 99805 41ae41 99804->99805 99806 41ac30 LdrLoadDll 99805->99806 99807 41ae4a 99806->99807 99808 41ac30 LdrLoadDll 99807->99808 99809 41ae53 99808->99809 99810 41ac30 LdrLoadDll 99809->99810 99811 41ae5c 99810->99811 99812 41ac30 LdrLoadDll 99811->99812 99813 41ae68 99812->99813 99814 41ac30 LdrLoadDll 99813->99814 99815 41ae71 99814->99815 99816 41ac30 LdrLoadDll 99815->99816 99817 41ae7a 99816->99817 99818 41ac30 LdrLoadDll 99817->99818 99819 41ae83 99818->99819 99820 41ac30 LdrLoadDll 99819->99820 99821 41ae8c 99820->99821 99822 41ac30 LdrLoadDll 99821->99822 99823 41ae95 99822->99823 99824 41ac30 LdrLoadDll 99823->99824 99825 41aea1 99824->99825 99826 41ac30 LdrLoadDll 99825->99826 99827 41aeaa 99826->99827 99828 41ac30 LdrLoadDll 99827->99828 99829 41aeb3 99828->99829 99830 41ac30 LdrLoadDll 99829->99830 99831 41aebc 99830->99831 99832 41ac30 LdrLoadDll 99831->99832 99833 41aec5 99832->99833 99834 41ac30 LdrLoadDll 99833->99834 99835 41aece 99834->99835 99836 41ac30 LdrLoadDll 99835->99836 99837 41aeda 99836->99837 99838 41ac30 LdrLoadDll 99837->99838 99839 41aee3 99838->99839 99840 41ac30 LdrLoadDll 99839->99840 99841 41aeec 99840->99841 99841->99619 99843 41af60 LdrLoadDll 99842->99843 99844 419edc 99843->99844 99874 1222df0 LdrInitializeThunk 99844->99874 99845 419ef3 99845->99538 99847->99616 99849 41af60 LdrLoadDll 99848->99849 99850 41a55c NtAllocateVirtualMemory 99849->99850 99850->99720 99852 41cf40 99851->99852 99853 41cf46 99851->99853 99852->99725 99854 41bf90 2 API calls 99853->99854 99855 41cf6c 99854->99855 99855->99725 99857 41cfd0 99856->99857 99858 41d02d 99857->99858 99859 41bf90 2 API calls 99857->99859 99858->99733 99860 41d00a 99859->99860 99861 41bdc0 2 API calls 99860->99861 99861->99858 99862->99729 99863->99743 99864->99745 99865->99748 99866->99750 99867->99752 99869 41ac4b 99868->99869 99870 414e50 LdrLoadDll 99869->99870 99871 41ac6b 99870->99871 99872 414e50 LdrLoadDll 99871->99872 99873 41ad17 99871->99873 99872->99873 99873->99767 99873->99873 99874->99845 99876 1222c1f LdrInitializeThunk 99875->99876 99877 1222c11 99875->99877 99876->99626 99877->99626 99879 41a68c RtlFreeHeap 99878->99879 99880 41af60 LdrLoadDll 99878->99880 99879->99630 99880->99879 99882 407eb0 99881->99882 99883 407eab 99881->99883 99884 41bd40 2 API calls 99882->99884 99883->99546 99890 407ed5 99884->99890 99885 407f38 99885->99546 99886 419ec0 2 API calls 99886->99890 99887 407f3e 99889 407f64 99887->99889 99891 41a5c0 2 API calls 99887->99891 99889->99546 99890->99885 99890->99886 99890->99887 99892 41bd40 2 API calls 99890->99892 99897 41a5c0 99890->99897 99893 407f55 99891->99893 99892->99890 99893->99546 99895 40817e 99894->99895 99896 41a5c0 2 API calls 99894->99896 99895->99507 99896->99895 99898 41af60 LdrLoadDll 99897->99898 99899 41a5dc 99898->99899 99902 1222c70 LdrInitializeThunk 99899->99902 99900 41a5f3 99900->99890 99902->99900 99904 41b5c3 99903->99904 99907 40acf0 99904->99907 99908 40ad14 99907->99908 99909 40ad50 LdrLoadDll 99908->99909 99910 409c5b 99908->99910 99909->99910 99910->99515 99912 40b063 99911->99912 99914 40b0e0 99912->99914 99926 419c90 LdrLoadDll 99912->99926 99914->99520 99916 41af60 LdrLoadDll 99915->99916 99917 40f1bb 99916->99917 99917->99523 99918 41a7d0 99917->99918 99919 41a7ef LookupPrivilegeValueW 99918->99919 99920 41af60 LdrLoadDll 99918->99920 99919->99525 99920->99919 99922 41a27c 99921->99922 99923 41af60 LdrLoadDll 99921->99923 99927 1222ea0 LdrInitializeThunk 99922->99927 99923->99922 99924 41a29b 99924->99526 99926->99914 99927->99924 99929 40b1f0 99928->99929 99930 40b040 LdrLoadDll 99929->99930 99931 40b204 99930->99931 99931->99462 99933 40ae51 99932->99933 99934 40ae4d 99932->99934 99935 40ae6a 99933->99935 99936 40ae9c 99933->99936 99934->99464 99978 419cd0 LdrLoadDll 99935->99978 99979 419cd0 LdrLoadDll 99936->99979 99938 40aead 99938->99464 99940 40ae8c 99940->99464 99942 40f4a0 3 API calls 99941->99942 99943 4143c6 99941->99943 99942->99943 99943->99466 99945 408a79 99944->99945 99980 4087a0 99944->99980 99947 408a9d 99945->99947 99948 4087a0 19 API calls 99945->99948 99947->99468 99949 408a8a 99948->99949 99949->99947 99998 40f710 10 API calls 99949->99998 99952 41af60 LdrLoadDll 99951->99952 99953 41a51c 99952->99953 100117 1222e80 LdrInitializeThunk 99953->100117 99954 40c322 99956 40f4a0 99954->99956 99957 40f4bd 99956->99957 100118 419fc0 99957->100118 99960 40f505 99960->99473 99961 41a010 2 API calls 99962 40f52e 99961->99962 99962->99473 99964 41af60 LdrLoadDll 99963->99964 99965 41a02c 99964->99965 100124 1222d10 LdrInitializeThunk 99965->100124 99966 40c385 99966->99478 99966->99481 99969 41af60 LdrLoadDll 99968->99969 99970 41a07c 99969->99970 100125 1222d30 LdrInitializeThunk 99970->100125 99971 40c459 99971->99489 99974 41af60 LdrLoadDll 99973->99974 99975 419e3c 99974->99975 100126 1222fb0 LdrInitializeThunk 99975->100126 99976 40c4ac 99976->99493 99978->99940 99979->99938 99981 407ea0 4 API calls 99980->99981 99986 4087ba 99980->99986 99981->99986 99982 408a49 99982->99945 99983 408a3f 99984 408160 2 API calls 99983->99984 99984->99982 99986->99982 99986->99983 99988 419f00 2 API calls 99986->99988 99990 41a490 LdrLoadDll NtClose 99986->99990 99993 40c4c0 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk 99986->99993 99996 419e20 2 API calls 99986->99996 99999 419d10 99986->99999 100002 4085d0 99986->100002 100014 40f5f0 LdrLoadDll NtClose 99986->100014 100015 419d90 LdrLoadDll 99986->100015 100016 419dc0 LdrLoadDll 99986->100016 100017 419e50 LdrLoadDll 99986->100017 100018 4083a0 99986->100018 100034 405f60 LdrLoadDll 99986->100034 99988->99986 99990->99986 99993->99986 99996->99986 99998->99947 100000 41af60 LdrLoadDll 99999->100000 100001 419d2c 100000->100001 100001->99986 100003 4085e6 100002->100003 100035 419880 100003->100035 100005 4085ff 100013 408771 100005->100013 100056 4081a0 100005->100056 100007 4086e5 100008 4083a0 11 API calls 100007->100008 100007->100013 100009 408713 100008->100009 100010 419f00 2 API calls 100009->100010 100009->100013 100011 408748 100010->100011 100012 41a500 2 API calls 100011->100012 100011->100013 100012->100013 100013->99986 100014->99986 100015->99986 100016->99986 100017->99986 100019 4083c9 100018->100019 100096 408310 100019->100096 100022 41a500 2 API calls 100023 4083dc 100022->100023 100023->100022 100024 408467 100023->100024 100026 408462 100023->100026 100104 40f670 100023->100104 100024->99986 100025 41a490 2 API calls 100027 40849a 100025->100027 100026->100025 100027->100024 100028 419d10 LdrLoadDll 100027->100028 100029 4084ff 100028->100029 100029->100024 100108 419d50 100029->100108 100031 408563 100031->100024 100032 414a50 8 API calls 100031->100032 100033 4085b8 100032->100033 100033->99986 100034->99986 100036 41bf90 2 API calls 100035->100036 100037 419897 100036->100037 100063 409310 100037->100063 100039 4198b2 100040 4198f0 100039->100040 100041 4198d9 100039->100041 100044 41bd40 2 API calls 100040->100044 100042 41bdc0 2 API calls 100041->100042 100043 4198e6 100042->100043 100043->100005 100045 41992a 100044->100045 100046 41bd40 2 API calls 100045->100046 100047 419943 100046->100047 100053 419be4 100047->100053 100069 41bd80 100047->100069 100050 419bd0 100051 41bdc0 2 API calls 100050->100051 100052 419bda 100051->100052 100052->100005 100054 41bdc0 2 API calls 100053->100054 100055 419c39 100054->100055 100055->100005 100057 40829f 100056->100057 100058 4081b5 100056->100058 100057->100007 100058->100057 100059 414a50 8 API calls 100058->100059 100060 408222 100059->100060 100061 41bdc0 2 API calls 100060->100061 100062 408249 100060->100062 100061->100062 100062->100007 100064 409335 100063->100064 100065 40acf0 LdrLoadDll 100064->100065 100066 409368 100065->100066 100068 40938d 100066->100068 100072 40cf20 100066->100072 100068->100039 100090 41a580 100069->100090 100073 40cf4c 100072->100073 100074 41a1e0 LdrLoadDll 100073->100074 100075 40cf65 100074->100075 100076 40cf6c 100075->100076 100083 41a220 100075->100083 100076->100068 100080 40cfa7 100081 41a490 2 API calls 100080->100081 100082 40cfca 100081->100082 100082->100068 100084 41a23c 100083->100084 100085 41af60 LdrLoadDll 100083->100085 100089 1222ca0 LdrInitializeThunk 100084->100089 100085->100084 100086 40cf8f 100086->100076 100088 41a810 LdrLoadDll 100086->100088 100088->100080 100089->100086 100091 41af60 LdrLoadDll 100090->100091 100092 41a59c 100091->100092 100095 1222f90 LdrInitializeThunk 100092->100095 100093 419bc9 100093->100050 100093->100053 100095->100093 100097 408328 100096->100097 100098 40acf0 LdrLoadDll 100097->100098 100099 408343 100098->100099 100100 414e50 LdrLoadDll 100099->100100 100101 408353 100100->100101 100102 40835c PostThreadMessageW 100101->100102 100103 408370 100101->100103 100102->100103 100103->100023 100105 40f683 100104->100105 100111 419e90 100105->100111 100109 41af60 LdrLoadDll 100108->100109 100110 419d6c 100109->100110 100110->100031 100112 419eac 100111->100112 100113 41af60 LdrLoadDll 100111->100113 100116 1222dd0 LdrInitializeThunk 100112->100116 100113->100112 100114 40f6ae 100114->100023 100116->100114 100117->99954 100119 41af60 LdrLoadDll 100118->100119 100120 419fdc 100119->100120 100123 1222f30 LdrInitializeThunk 100120->100123 100121 40f4fe 100121->99960 100121->99961 100123->100121 100124->99966 100125->99971 100126->99976 100130 1222ad0 LdrInitializeThunk

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 0 41a410-41a426 1 41a42c-41a459 NtReadFile 0->1 2 41a427 call 41af60 0->2 2->1
              APIs
              • NtReadFile.NTDLL(rMA,5EB65239,FFFFFFFF,?,?,?,rMA,?,1JA,FFFFFFFF,5EB65239,00414D72,?,00000000), ref: 0041A455
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2227875031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_400000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Yara matches
              Similarity
              • API ID: FileRead
              • String ID: 1JA$rMA$rMA
              • API String ID: 2738559852-782607585
              • Opcode ID: d4a5a74702051ab3f1355cb9c04464ae45872bc81882c1ce62b08827cfd1deed
              • Instruction ID: c6e97d42c3e85b78cd3a41c20c82dd28da71633a8e67c8174f08c115ef6e08ba
              • Opcode Fuzzy Hash: d4a5a74702051ab3f1355cb9c04464ae45872bc81882c1ce62b08827cfd1deed
              • Instruction Fuzzy Hash: 87F0B7B2200208AFCB14DF89DC81EEB77ADEF8C754F158249BE1D97241D630E851CBA4

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 3 41a40a-41a459 call 41af60 NtReadFile
              APIs
              • NtReadFile.NTDLL(rMA,5EB65239,FFFFFFFF,?,?,?,rMA,?,1JA,FFFFFFFF,5EB65239,00414D72,?,00000000), ref: 0041A455
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2227875031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_400000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Yara matches
              Similarity
              • API ID: FileRead
              • String ID: 1JA$rMA$rMA
              • API String ID: 2738559852-782607585
              • Opcode ID: 04ce376e678edcdb9751289a0f82548d436417c29a13e682c939fe5dcdc6d76c
              • Instruction ID: b0d4b4de7d76c8bf591afcef4104654b5335bd7ab6703c25e51113693fc8203e
              • Opcode Fuzzy Hash: 04ce376e678edcdb9751289a0f82548d436417c29a13e682c939fe5dcdc6d76c
              • Instruction Fuzzy Hash: B1F01DB6200149ABCB04DF98D990CEB77ADFF8C314B15864DF95D97201C634E8558BA4

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 219 40acf0-40ad0c 220 40ad14-40ad19 219->220 221 40ad0f call 41cc50 219->221 222 40ad1b-40ad1e 220->222 223 40ad1f-40ad2d call 41d070 220->223 221->220 226 40ad3d-40ad4e call 41b4a0 223->226 227 40ad2f-40ad3a call 41d2f0 223->227 232 40ad50-40ad64 LdrLoadDll 226->232 233 40ad67-40ad6a 226->233 227->226 232->233
              APIs
              • LdrLoadDll.NTDLL(00000000,00000000,00000003,?), ref: 0040AD62
              Memory Dump Source
              • Source File: 00000004.00000002.2227875031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_400000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Yara matches
              Similarity
              • API ID: Load
              • String ID:
              • API String ID: 2234796835-0
              • Opcode ID: dc2098e385e942efcd48a296202403441f5905bb34daa24398974f8d6af8945c
              • Instruction ID: bd03027937dafe21d6f438616a486266aae6a772261e1344982784e00def1180
              • Opcode Fuzzy Hash: dc2098e385e942efcd48a296202403441f5905bb34daa24398974f8d6af8945c
              • Instruction Fuzzy Hash: 80015EB5E0020DBBDF10DBA1DC42FDEB3789F54308F0045AAA908A7281F634EB548B95

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 234 41a35a-41a3b1 call 41af60 NtCreateFile
              APIs
              • NtCreateFile.NTDLL(00000060,00409CF3,?,00414BB7,00409CF3,FFFFFFFF,?,?,FFFFFFFF,00409CF3,00414BB7,?,00409CF3,00000060,00000000,00000000), ref: 0041A3AD
              Memory Dump Source
              • Source File: 00000004.00000002.2227875031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_400000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Yara matches
              Similarity
              • API ID: CreateFile
              • String ID:
              • API String ID: 823142352-0
              • Opcode ID: b7c82dd204dac21fe647372479e01c61b9d40f16f17e88d6db4b886f29bcc5fb
              • Instruction ID: 159411f34822f584cba13318e380b0e6d4baf2e06112cf03047d7a0e9d554c69
              • Opcode Fuzzy Hash: b7c82dd204dac21fe647372479e01c61b9d40f16f17e88d6db4b886f29bcc5fb
              • Instruction Fuzzy Hash: 4401EFB2201208AFCB48CF88CC81EEB37E9AF8C754F158609FA0DD7241D630E8518BA0

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 243 41a360-41a376 244 41a37c-41a3b1 NtCreateFile 243->244 245 41a377 call 41af60 243->245 245->244
              APIs
              • NtCreateFile.NTDLL(00000060,00409CF3,?,00414BB7,00409CF3,FFFFFFFF,?,?,FFFFFFFF,00409CF3,00414BB7,?,00409CF3,00000060,00000000,00000000), ref: 0041A3AD
              Memory Dump Source
              • Source File: 00000004.00000002.2227875031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_400000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Yara matches
              Similarity
              • API ID: CreateFile
              • String ID:
              • API String ID: 823142352-0
              • Opcode ID: 255eac8f353b7b8934ff6a71ff904c2473dc3201d920852afcf054611f931be4
              • Instruction ID: 1571a74e51eef41835f20cf1113afde9e84efeac6e640e2865a3d9423fa4fe5b
              • Opcode Fuzzy Hash: 255eac8f353b7b8934ff6a71ff904c2473dc3201d920852afcf054611f931be4
              • Instruction Fuzzy Hash: FEF0BDB2201208ABCB08CF89DC85EEB77ADAF8C754F158248BA0D97241C630E8518BA4

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 246 41a540-41a57d call 41af60 NtAllocateVirtualMemory
              APIs
              • NtAllocateVirtualMemory.NTDLL(00003000,?,00000000,?,0041B134,?,00000000,?,00003000,00000040,00000000,00000000,00409CF3), ref: 0041A579
              Memory Dump Source
              • Source File: 00000004.00000002.2227875031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_400000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Yara matches
              Similarity
              • API ID: AllocateMemoryVirtual
              • String ID:
              • API String ID: 2167126740-0
              • Opcode ID: b2c7a9f16f7248b886659db27fd6bc2ac43cd74a54ece53f3674161978f52f4b
              • Instruction ID: 60dc777ab2a5703fe93ec60752bbea5a413bae98553eb5929f98badcd8fbe991
              • Opcode Fuzzy Hash: b2c7a9f16f7248b886659db27fd6bc2ac43cd74a54ece53f3674161978f52f4b
              • Instruction Fuzzy Hash: B2F015B2200208ABCB14DF89CC81EEB77ADEF8C754F158149BE0897241C630F811CBA4

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 258 41a490-41a4b9 call 41af60 NtClose
              APIs
              • NtClose.NTDLL(00414D50,?,?,00414D50,00409CF3,FFFFFFFF), ref: 0041A4B5
              Memory Dump Source
              • Source File: 00000004.00000002.2227875031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_400000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Yara matches
              Similarity
              • API ID: Close
              • String ID:
              • API String ID: 3535843008-0
              • Opcode ID: 462dc2fd90f57a4a7913ee6487bbcc8fe2490777b3746e68c632e34f0b64e1a4
              • Instruction ID: a008c5d5ec14fa9f5013d94ab86a46559dd82bf248144eb087863a0ac6a31d62
              • Opcode Fuzzy Hash: 462dc2fd90f57a4a7913ee6487bbcc8fe2490777b3746e68c632e34f0b64e1a4
              • Instruction Fuzzy Hash: F7D01776200218ABD710EB99CC85EE77BACEF48B64F158499BA1C9B242C530FA1086E0
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: 3da52feee8e27060c706228707ce4de3bd75b189bbce596f0a2cf33d675c1603
              • Instruction ID: d84bad8ac937d6fd2d0a4f01a187b4a3880981e397e600264a43d7d79ab48993
              • Opcode Fuzzy Hash: 3da52feee8e27060c706228707ce4de3bd75b189bbce596f0a2cf33d675c1603
              • Instruction Fuzzy Hash: 599002A121240003410571584414616401A97E0201B55C121F2018990DC52589927225
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: f709e64f82e315f880645e29d20015499172328e585c9672bf0d4f695e297ea2
              • Instruction ID: 78a9261fe0746ca4ae67b7b154ebc9c47c37be2605cc33dfd83c505c031940a0
              • Opcode Fuzzy Hash: f709e64f82e315f880645e29d20015499172328e585c9672bf0d4f695e297ea2
              • Instruction Fuzzy Hash: 7790027121140802D1807158440464A001597D1301F95C115B1029A54DCA158B5A77A1
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: 22c2aa0c7ddea27e394c1443c9963015b10dc73a0707c084c9fc6f2d4aa34156
              • Instruction ID: e776d76651072d20cf7b1115c4d52620a1880ae2ded5a8adcafd7011b0fb33d9
              • Opcode Fuzzy Hash: 22c2aa0c7ddea27e394c1443c9963015b10dc73a0707c084c9fc6f2d4aa34156
              • Instruction Fuzzy Hash: 1F900265221400030105B5580704507005697D5351355C121F2019950CD62189626221
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: 920ec38b47111f30a304e6837e0141ac474897012fb1b76be807b0d7b8bc9b29
              • Instruction ID: acd66314f94dd4af9ebea891577c791e66c3cc6556a7c90b633722ed42adba84
              • Opcode Fuzzy Hash: 920ec38b47111f30a304e6837e0141ac474897012fb1b76be807b0d7b8bc9b29
              • Instruction Fuzzy Hash: D990047131140003D140715C541C7074015F7F1301F55D111F141CD54CDD15CD577333
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: bf5af54c236106c331c49dce3c86ab9980e3d194156591b1c578b978e524c6b5
              • Instruction ID: d09eda16c23978e9cd835aad5fd2ea4e5416e9a20619407c251c2146318d8187
              • Opcode Fuzzy Hash: bf5af54c236106c331c49dce3c86ab9980e3d194156591b1c578b978e524c6b5
              • Instruction Fuzzy Hash: 9990026922340002D1807158540860A001597D1202F95D515B1019958CC915896A6321
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: 0dd750169ea3f979bf7671a6f9b7c619240d31ad70b7fda550bf5971d924a992
              • Instruction ID: 93253da92dce6dce58e2d4dcd3dc492bb918f16c6fa7a165dd46ab9271e9b8c5
              • Opcode Fuzzy Hash: 0dd750169ea3f979bf7671a6f9b7c619240d31ad70b7fda550bf5971d924a992
              • Instruction Fuzzy Hash: 2290027121140413D11171584504707001997D0241F95C512B1428958DD6568A53B221
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: fc4af25b63763168bb0a88d3816221bb1b2a1bcdff64d7a99ff0eadca9ff30fe
              • Instruction ID: f2957866d7183936380626302f31658a3b912ab3a026db96d0622093de36732d
              • Opcode Fuzzy Hash: fc4af25b63763168bb0a88d3816221bb1b2a1bcdff64d7a99ff0eadca9ff30fe
              • Instruction Fuzzy Hash: B4900261252441525545B15844045074016A7E0241795C112B2418D50CC5269957E721
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: d5ffab98cc802d2e4fbb649cbef4557712cd1a26eb7831af1053922e42d26660
              • Instruction ID: abf276641aee76f7e5c8d74fcc4f94f552f7d3cd3756eb8c8d785b43640a4791
              • Opcode Fuzzy Hash: d5ffab98cc802d2e4fbb649cbef4557712cd1a26eb7831af1053922e42d26660
              • Instruction Fuzzy Hash: A290027121148802D1107158840474A001597D0301F59C511B5428A58DC69589927221
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: 3054bbc3be8e2173ceb62e396ab5c6f67e3cd47b9b6816ffebe40d975df5ef55
              • Instruction ID: 96fd51f28485058ab336d644275345ec9a3943cc987de9a6beb698047f79e8da
              • Opcode Fuzzy Hash: 3054bbc3be8e2173ceb62e396ab5c6f67e3cd47b9b6816ffebe40d975df5ef55
              • Instruction Fuzzy Hash: CB90027121140402D10075985408646001597E0301F55D111B6028955EC66589927231
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: 9c562c907f47b2196c4f29659fe4323053f067f36ee1eecfb3ca0fc22a996904
              • Instruction ID: c13dbd3f88e345c5834ec60289170bbe45fc2f771280891aac7c21dc1bc9d173
              • Opcode Fuzzy Hash: 9c562c907f47b2196c4f29659fe4323053f067f36ee1eecfb3ca0fc22a996904
              • Instruction Fuzzy Hash: F49002A135140442D10071584414B060015D7E1301F55C115F2068954DC619CD537226
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: 38f5de467d36b84a7fc45fa5030c160184c69a307dc2d5620de701b85db7da93
              • Instruction ID: 58c823de260943f2d1c351b5950f3fbaf1814974c27147a6c65d1492c462743b
              • Opcode Fuzzy Hash: 38f5de467d36b84a7fc45fa5030c160184c69a307dc2d5620de701b85db7da93
              • Instruction Fuzzy Hash: 22900261611400424140716888449064015BBE1211755C221B199C950DC55989666765
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: 5a85e823a74bc6caeafdbdf713d94b6af86c555fea18e4488773a1ec9504a1c3
              • Instruction ID: 79fbe780a30f2bfc5282245897a6a100268994e314de660cc4d84cb54a4d4fdc
              • Opcode Fuzzy Hash: 5a85e823a74bc6caeafdbdf713d94b6af86c555fea18e4488773a1ec9504a1c3
              • Instruction Fuzzy Hash: 8090027121180402D1007158481470B001597D0302F55C111B2168955DC62589527671
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: d89cc6ca645d06c7ca3c1c527e3dca8268537638ea6b5b519291569a022b5a19
              • Instruction ID: d770c0258a3d6b3b619acd36eda5b53a809f605099c9944fe5fb4e9716fb1edf
              • Opcode Fuzzy Hash: d89cc6ca645d06c7ca3c1c527e3dca8268537638ea6b5b519291569a022b5a19
              • Instruction Fuzzy Hash: A3900261221C0042D20075684C14B07001597D0303F55C215B1158954CC91589626621
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: b6c748a1fdad94fd803e08d498fd9dc018d1faf8378043d128aeb7198d0c4902
              • Instruction ID: 6c5cb2e21f9f708caed211826ab1a0e4c144b25e2dca80123ea3a136663edc3a
              • Opcode Fuzzy Hash: b6c748a1fdad94fd803e08d498fd9dc018d1faf8378043d128aeb7198d0c4902
              • Instruction Fuzzy Hash: 319002B121140402D14071584404746001597D0301F55C111B6068954EC6598ED67765
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: 80d3793951fadab18f1e46842e91e1d0fd9869139468fc3defb5e4d64e36120f
              • Instruction ID: cf923ed9ae6b851c5f69d1f050bdcd7a5f14eb78b1e17017add6cbffd1a62307
              • Opcode Fuzzy Hash: 80d3793951fadab18f1e46842e91e1d0fd9869139468fc3defb5e4d64e36120f
              • Instruction Fuzzy Hash: 6590026161140502D10171584404616001A97D0241F95C122B2028955ECA258A93B231
              Memory Dump Source
              • Source File: 00000004.00000002.2227875031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_400000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: bf70d19deb8b7dbf65a1c14f2d3141162741e3067e6603a799ea80fa30cdc1c2
              • Instruction ID: 0b46cc9625fd597f0f1293e0fe630cc8c1f9f1e3f005c30533d49d025d22dd75
              • Opcode Fuzzy Hash: bf70d19deb8b7dbf65a1c14f2d3141162741e3067e6603a799ea80fa30cdc1c2
              • Instruction Fuzzy Hash: 97210AB2D4020857CB25D674AD52BFF73BCAB54314F04007FE949A3182F638BE498BA5

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 6 41a630-41a661 call 41af60 RtlAllocateHeap
              APIs
              • RtlAllocateHeap.NTDLL(6EA,?,00414CAF,00414CAF,?,00414536,?,?,?,?,?,00000000,00409CF3,?), ref: 0041A65D
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2227875031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_400000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Yara matches
              Similarity
              • API ID: AllocateHeap
              • String ID: 6EA
              • API String ID: 1279760036-1400015478
              • Opcode ID: 5b685ba00e4f3e285a347290f69675979fbe5b3df3c61f88542a29b4b9d62cf4
              • Instruction ID: b63900df46c74d48569035b2bcc9be016157083d4ef88d1b541c797289a4eec1
              • Opcode Fuzzy Hash: 5b685ba00e4f3e285a347290f69675979fbe5b3df3c61f88542a29b4b9d62cf4
              • Instruction Fuzzy Hash: 46E012B1200208ABDB14EF99CC41EA777ACEF88664F158559BA085B242C630F9118AB0

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 204 408310-40835a call 41be60 call 41ca00 call 40acf0 call 414e50 213 40835c-40836e PostThreadMessageW 204->213 214 40838e-408392 204->214 215 408370-40838a call 40a480 213->215 216 40838d 213->216 215->216 216->214
              APIs
              • PostThreadMessageW.USER32(?,00000111,00000000,00000000,?), ref: 0040836A
              Memory Dump Source
              • Source File: 00000004.00000002.2227875031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_400000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Yara matches
              Similarity
              • API ID: MessagePostThread
              • String ID:
              • API String ID: 1836367815-0
              • Opcode ID: eeb461d9a93cfa80389428809ed4c10d2a707c26e4e5d313531af448f679d8da
              • Instruction ID: fe648ddaccc693dff6b318d6e20673cc1517f8ca6da234ac2c2ad493b9bfa733
              • Opcode Fuzzy Hash: eeb461d9a93cfa80389428809ed4c10d2a707c26e4e5d313531af448f679d8da
              • Instruction Fuzzy Hash: FF018431A8032C76E721A6959C43FFE776C5B40F54F05011AFF04BA1C2EAA8690546EA

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 237 41a7c2-41a7cb 238 41a7cd-41a7ea call 41af60 237->238 239 41a7ac-41a7c0 237->239 242 41a7ef-41a804 LookupPrivilegeValueW 238->242
              APIs
              • LookupPrivilegeValueW.ADVAPI32(00000000,0000003C,0040F1D2,0040F1D2,0000003C,00000000,?,00409D65), ref: 0041A800
              Memory Dump Source
              • Source File: 00000004.00000002.2227875031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_400000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Yara matches
              Similarity
              • API ID: LookupPrivilegeValue
              • String ID:
              • API String ID: 3899507212-0
              • Opcode ID: a496f38d62274ef6293b7414ddfcee86aa1f2983a0e4186dedcc86b2506cb2a9
              • Instruction ID: d99af1ccc2e3a41905549a2c7186a1e47417f692c9093ccbc51682857587e646
              • Opcode Fuzzy Hash: a496f38d62274ef6293b7414ddfcee86aa1f2983a0e4186dedcc86b2506cb2a9
              • Instruction Fuzzy Hash: 3AF049B62001187FDB14DFA9DC84EEB37A9EF88350F108519F91CD7281C631E9518BB4

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 249 41a662-41a687 call 41af60 251 41a68c-41a6a1 RtlFreeHeap 249->251
              APIs
              • RtlFreeHeap.NTDLL(00000060,00409CF3,?,?,00409CF3,00000060,00000000,00000000,?,?,00409CF3,?,00000000), ref: 0041A69D
              Memory Dump Source
              • Source File: 00000004.00000002.2227875031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_400000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Yara matches
              Similarity
              • API ID: FreeHeap
              • String ID:
              • API String ID: 3298025750-0
              • Opcode ID: f328f87049165c24a51f13d9e7a0f1effd32b804806cab775e60eade8b30b86c
              • Instruction ID: 361753aced8246878da85d9549347fae3a264afc1108e3ae6c6f607104c80fd3
              • Opcode Fuzzy Hash: f328f87049165c24a51f13d9e7a0f1effd32b804806cab775e60eade8b30b86c
              • Instruction Fuzzy Hash: 53E068B41042850FD700EE79949049F37D4FF80328724865BEC584B307D024C45B8761

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 252 41a670-41a686 253 41a68c-41a6a1 RtlFreeHeap 252->253 254 41a687 call 41af60 252->254 254->253
              APIs
              • RtlFreeHeap.NTDLL(00000060,00409CF3,?,?,00409CF3,00000060,00000000,00000000,?,?,00409CF3,?,00000000), ref: 0041A69D
              Memory Dump Source
              • Source File: 00000004.00000002.2227875031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_400000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Yara matches
              Similarity
              • API ID: FreeHeap
              • String ID:
              • API String ID: 3298025750-0
              • Opcode ID: c73a038728a0c461ae7389dd2c659cb336152b082840842379cc140023e4f07c
              • Instruction ID: 086aab0bc8c344d6c60c9bbd5a0512cabfd8005857d16272e4a7e29987098a06
              • Opcode Fuzzy Hash: c73a038728a0c461ae7389dd2c659cb336152b082840842379cc140023e4f07c
              • Instruction Fuzzy Hash: C1E012B1200208ABDB18EF99CC49EA777ACEF88764F118559BA085B242C630E9108AB0

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 255 41a7d0-41a7e9 256 41a7ef-41a804 LookupPrivilegeValueW 255->256 257 41a7ea call 41af60 255->257 257->256
              APIs
              • LookupPrivilegeValueW.ADVAPI32(00000000,0000003C,0040F1D2,0040F1D2,0000003C,00000000,?,00409D65), ref: 0041A800
              Memory Dump Source
              • Source File: 00000004.00000002.2227875031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_400000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Yara matches
              Similarity
              • API ID: LookupPrivilegeValue
              • String ID:
              • API String ID: 3899507212-0
              • Opcode ID: 6066231f07dbbfb97dda43844c8c8cc76a5ad0e3334111b5d8a4297bdf0bdfe7
              • Instruction ID: 3f9aab8e47c10174471559fee5d267dc63a882ce56825bdd12c8e63267ac542a
              • Opcode Fuzzy Hash: 6066231f07dbbfb97dda43844c8c8cc76a5ad0e3334111b5d8a4297bdf0bdfe7
              • Instruction Fuzzy Hash: 23E01AB12002086BDB10DF49CC85EE737ADEF88654F118155BA0C57241C934E8118BF5
              APIs
              • ExitProcess.KERNEL32(?,?,00000000,?,?,?), ref: 0041A6D8
              Memory Dump Source
              • Source File: 00000004.00000002.2227875031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_400000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Yara matches
              Similarity
              • API ID: ExitProcess
              • String ID:
              • API String ID: 621844428-0
              • Opcode ID: caa18f4ccbf82a939ed7a560578cfa8cb4ed60065234b72d20cd43f227523b36
              • Instruction ID: 671013aba82168957284564a3a9f05bc2528e3e40ec9789e05460755300894f7
              • Opcode Fuzzy Hash: caa18f4ccbf82a939ed7a560578cfa8cb4ed60065234b72d20cd43f227523b36
              • Instruction Fuzzy Hash: 68D017726002187BD620EB99CC85FD777ACDF48BA4F1580A9BA1C6B242C531BA108AE1
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: 19b0c220a0dba0a2534a7ac13453737988fc86ea2b465e61522055e31f00349f
              • Instruction ID: 8cf77cac1d54d66c47887e61537e8710c4bb88fbd2501c4318257d28e09cdd82
              • Opcode Fuzzy Hash: 19b0c220a0dba0a2534a7ac13453737988fc86ea2b465e61522055e31f00349f
              • Instruction Fuzzy Hash: 6AB09B719115D5D5DA11E764460871B791077D0701F16C161E3034742F4739C1D1F375
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: @$@$CFGOptions$DisableExceptionChainValidation$DisableHeapLookaside$ExecuteOptions$FrontEndHeapDebugOptions$GlobalFlag$GlobalFlag2$Initializing the application verifier package failed with status 0x%08lx$LdrpInitializeExecutionOptions$MaxDeadActivationContexts$MaxLoaderThreads$MinimumStackCommitInBytes$RaiseExceptionOnPossibleDeadlock$ShutdownFlags$TracingFlags$UnloadEventTraceDepth$UseImpersonatedDeviceMap$minkernel\ntdll\ldrinit.c
              • API String ID: 0-2160512332
              • Opcode ID: f617f0a0c40f752487a72cbd617cea7099d657f6cfd0c7403ce8156ccd3b7974
              • Instruction ID: f515e4f934ec8e4d3a2700466e5db96327246ecda66936a3c6de3ab92e0d9eca
              • Opcode Fuzzy Hash: f617f0a0c40f752487a72cbd617cea7099d657f6cfd0c7403ce8156ccd3b7974
              • Instruction Fuzzy Hash: 39928C71624342EFE725CE28C881B6BB7E8BB84754F14492DFB94D7291D770E884CB92
              Strings
              • Critical section debug info address, xrefs: 0125541F, 0125552E
              • Second initialization stack trace. Use dps to dump it if non-NULL., xrefs: 012554CE
              • Critical section address, xrefs: 01255425, 012554BC, 01255534
              • undeleted critical section in freed memory, xrefs: 0125542B
              • First initialization stack trace. Use dps to dump it if non-NULL., xrefs: 012554E2
              • corrupted critical section, xrefs: 012554C2
              • Thread is in a state in which it cannot own a critical section, xrefs: 01255543
              • Invalid debug info address of this critical section, xrefs: 012554B6
              • Critical section address., xrefs: 01255502
              • double initialized or corrupted critical section, xrefs: 01255508
              • Initialization stack trace. Use dps to dump it if non-NULL., xrefs: 0125540A, 01255496, 01255519
              • Thread identifier, xrefs: 0125553A
              • Address of the debug info found in the active list., xrefs: 012554AE, 012554FA
              • 8, xrefs: 012552E3
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: 8$Address of the debug info found in the active list.$Critical section address$Critical section address.$Critical section debug info address$First initialization stack trace. Use dps to dump it if non-NULL.$Initialization stack trace. Use dps to dump it if non-NULL.$Invalid debug info address of this critical section$Second initialization stack trace. Use dps to dump it if non-NULL.$Thread identifier$Thread is in a state in which it cannot own a critical section$corrupted critical section$double initialized or corrupted critical section$undeleted critical section in freed memory
              • API String ID: 0-2368682639
              • Opcode ID: 72b9398d29f415482a3adbf2e52df0381097dbbbcd7e4110226a8b2877900431
              • Instruction ID: 6f8cb321e2e9311b6e1cbb0081e33d6b56d26f0c723a0287f9b24cccad06d037
              • Opcode Fuzzy Hash: 72b9398d29f415482a3adbf2e52df0381097dbbbcd7e4110226a8b2877900431
              • Instruction Fuzzy Hash: AD81BAB0A50359EFDB64CF99C885BAEBBB5FB18B14F10411DFA08B7241D3B5A941CB60
              Strings
              • SXS: %s() bad parametersSXS: Map : %pSXS: Data : %pSXS: AssemblyRosterIndex: 0x%lxSXS: Map->AssemblyCount : 0x%lx, xrefs: 01252624
              • SXS: Unable to resolve storage root for assembly directory %wZ in %Iu tries, xrefs: 012524C0
              • SXS: Attempt to probe known root of assembly storage ("%wZ") failed; Status = 0x%08lx, xrefs: 01252409
              • SXS: Attempt to translate DOS path name "%S" to NT format failed, xrefs: 01252506
              • SXS: Storage resolution failed to insert entry to storage map; Status = 0x%08lx, xrefs: 01252602
              • @, xrefs: 0125259B
              • SXS: Attempt to insert well known storage root into assembly storage map assembly roster index %lu failed; Status = 0x%08lx, xrefs: 01252412
              • SXS: Attempt to probe assembly storage root %wZ for assembly directory %wZ failed with status = 0x%08lx, xrefs: 01252498
              • SXS: Assembly directory name stored in assembly information too long (%lu bytes) - ACTIVATION_CONTEXT_DATA at %p, xrefs: 012522E4
              • SXS: Unable to open assembly directory under storage root "%S"; Status = 0x%08lx, xrefs: 012525EB
              • RtlpResolveAssemblyStorageMapEntry, xrefs: 0125261F
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: @$RtlpResolveAssemblyStorageMapEntry$SXS: %s() bad parametersSXS: Map : %pSXS: Data : %pSXS: AssemblyRosterIndex: 0x%lxSXS: Map->AssemblyCount : 0x%lx$SXS: Assembly directory name stored in assembly information too long (%lu bytes) - ACTIVATION_CONTEXT_DATA at %p$SXS: Attempt to insert well known storage root into assembly storage map assembly roster index %lu failed; Status = 0x%08lx$SXS: Attempt to probe assembly storage root %wZ for assembly directory %wZ failed with status = 0x%08lx$SXS: Attempt to probe known root of assembly storage ("%wZ") failed; Status = 0x%08lx$SXS: Attempt to translate DOS path name "%S" to NT format failed$SXS: Storage resolution failed to insert entry to storage map; Status = 0x%08lx$SXS: Unable to open assembly directory under storage root "%S"; Status = 0x%08lx$SXS: Unable to resolve storage root for assembly directory %wZ in %Iu tries
              • API String ID: 0-4009184096
              • Opcode ID: edfa4dbaf77bd7d623f1b96bf2fe5308cb249561f837fcd5dd5f31b5052550a0
              • Instruction ID: 515542033f38a25bb4c6cd7722a4bb16bfc353c43ce33bf2bfffb582ceaa38e6
              • Opcode Fuzzy Hash: edfa4dbaf77bd7d623f1b96bf2fe5308cb249561f837fcd5dd5f31b5052550a0
              • Instruction Fuzzy Hash: A60280B1D10229DFDB61DB54CC81BAAB7B8AF54704F0141DAEB09A7281EB709F84CF59
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: DefaultBrowser_NOPUBLISHERID$SegmentHeap$csrss.exe$heapType$http://schemas.microsoft.com/SMI/2020/WindowsSettings$lsass.exe$runtimebroker.exe$services.exe$smss.exe$svchost.exe
              • API String ID: 0-2515994595
              • Opcode ID: f429fcb2b566e697f05d04a48c07b9faaafc8bf2c8c3997c47cb9c52a36606d1
              • Instruction ID: a9f153fdcfa15282ad7137660c0213775a9c24f5f83e046459efb061f8c8f1d4
              • Opcode Fuzzy Hash: f429fcb2b566e697f05d04a48c07b9faaafc8bf2c8c3997c47cb9c52a36606d1
              • Instruction Fuzzy Hash: 6951CF715263529BD329EF288884BABBBECBF98350F54491DEA58C32C4E770D504C792
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: About to reallocate block at %p to %Ix bytes$About to rellocate block at %p to 0x%Ix bytes with tag %ws$HEAP: $HEAP[%wZ]: $Invalid allocation size - %Ix (exceeded %Ix)$Just reallocated block at %p to %Ix bytes$Just reallocated block at %p to 0x%Ix bytes with tag %ws$RtlReAllocateHeap
              • API String ID: 0-1700792311
              • Opcode ID: c95a68c0b8fce10a591b7f8c9e0372ed12daf7d7ebb3754d802008da55c6d42f
              • Instruction ID: 390dadec173d47ea5b18d16bac1c909df59c053afe8734616fb9726264d68294
              • Opcode Fuzzy Hash: c95a68c0b8fce10a591b7f8c9e0372ed12daf7d7ebb3754d802008da55c6d42f
              • Instruction Fuzzy Hash: 56D11F3192028ADFDF2ADF6CD441AADBBF5FF4A704F088059F6459B252C3349980CB18
              Strings
              • VerifierDebug, xrefs: 01268CA5
              • VerifierDlls, xrefs: 01268CBD
              • AVRF: %ws: pid 0x%X: application verifier will be disabled due to an initialization error., xrefs: 01268A67
              • AVRF: %ws: pid 0x%X: flags 0x%X: application verifier enabled, xrefs: 01268A3D
              • AVRF: -*- final list of providers -*- , xrefs: 01268B8F
              • HandleTraces, xrefs: 01268C8F
              • VerifierFlags, xrefs: 01268C50
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: AVRF: %ws: pid 0x%X: application verifier will be disabled due to an initialization error.$AVRF: %ws: pid 0x%X: flags 0x%X: application verifier enabled$AVRF: -*- final list of providers -*- $HandleTraces$VerifierDebug$VerifierDlls$VerifierFlags
              • API String ID: 0-3223716464
              • Opcode ID: 24db772e00a09d85f0e818d463948d8f35599ce16373ce6ca332d952d2640fb0
              • Instruction ID: 3e0a4bcd47c4c67ba1cd95c92d793aa0db58da2c553559be60b6d3851a859bb5
              • Opcode Fuzzy Hash: 24db772e00a09d85f0e818d463948d8f35599ce16373ce6ca332d952d2640fb0
              • Instruction Fuzzy Hash: D7916772A65742EFD725DF68D895B2A77ECAB64B14F04041CFA40AB2C0D7B09C80CBA1
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: $LdrpResSearchResourceInsideDirectory Enter$LdrpResSearchResourceInsideDirectory Exit$R$T${
              • API String ID: 0-1109411897
              • Opcode ID: f0b26fef9512933f1a9ea82be529a3dcfad59b1305c4b60f7ee61d7a7fd4aef5
              • Instruction ID: 12d2bd0492a3f32b4f9ee1a6f3ebb77848fbfccb6c80ee60cb46fb55cca2b4f7
              • Opcode Fuzzy Hash: f0b26fef9512933f1a9ea82be529a3dcfad59b1305c4b60f7ee61d7a7fd4aef5
              • Instruction Fuzzy Hash: 3BA25874A15A6A8FDB68DF58CC887ADBBB5BF45304F1442E9D90DA7290DB309E81CF00
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: Delaying execution failed with status 0x%08lx$LDR:MRDATA: Process initialization failed with status 0x%08lx$NtWaitForSingleObject failed with status 0x%08lx, fallback to delay loop$Process initialization failed with status 0x%08lx$_LdrpInitialize$minkernel\ntdll\ldrinit.c
              • API String ID: 0-792281065
              • Opcode ID: ec3434de9bff81c3d375d68629fb925f9311ff371badb993ee24e357eb8f0329
              • Instruction ID: 0d5fd988677ca209f30587464d35bf8c610221417656eca0d4c311a753c8fc24
              • Opcode Fuzzy Hash: ec3434de9bff81c3d375d68629fb925f9311ff371badb993ee24e357eb8f0329
              • Instruction Fuzzy Hash: 19914B71F617669BEB39EF58E889BAE7BF1FB60B14F100118DA0067285E7F09441C791
              Strings
              • apphelp.dll, xrefs: 011D6496
              • LdrpInitShimEngine, xrefs: 012399F4, 01239A07, 01239A30
              • minkernel\ntdll\ldrinit.c, xrefs: 01239A11, 01239A3A
              • Building shim user DLL system32 filename failed with status 0x%08lx, xrefs: 012399ED
              • Getting the shim user exports failed with status 0x%08lx, xrefs: 01239A01
              • Loading the shim user DLL failed with status 0x%08lx, xrefs: 01239A2A
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: Building shim user DLL system32 filename failed with status 0x%08lx$Getting the shim user exports failed with status 0x%08lx$LdrpInitShimuser$Loading the shim user DLL failed with status 0x%08lx$apphelp.dll$minkernel\ntdll\ldrinit.c
              • API String ID: 0-204845295
              • Opcode ID: 8124893e6941f9e213f8da6f6aad462570c6a0f5cbc8d0addde10e9a5d03a701
              • Instruction ID: 8f7b9e94154dd502622f91f81875c260c8ffeb198db9ea0e720055d9072028d6
              • Opcode Fuzzy Hash: 8124893e6941f9e213f8da6f6aad462570c6a0f5cbc8d0addde10e9a5d03a701
              • Instruction Fuzzy Hash: AE5105B16283019FEB28DF24D885BAB77E4FB85B48F01091EF68597150D770E985CB93
              Strings
              • SXS: %s() passed the empty activation context, xrefs: 01252165
              • SXS: RtlGetAssemblyStorageRoot() unable to get activation context data, storage map and assembly roster header. Status = 0x%08lx, xrefs: 01252178
              • SXS: %s() bad parameters AssemblyRosterIndex 0x%lx >= AssemblyRosterHeader->EntryCount: 0x%lx, xrefs: 0125219F
              • SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: AssemblyRosterIndex: 0x%lxSXS: AssemblyStorageRoot: %pSXS: Callback : %p, xrefs: 012521BF
              • RtlGetAssemblyStorageRoot, xrefs: 01252160, 0125219A, 012521BA
              • SXS: RtlGetAssemblyStorageRoot() unable to resolve storage map entry. Status = 0x%08lx, xrefs: 01252180
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: RtlGetAssemblyStorageRoot$SXS: %s() bad parameters AssemblyRosterIndex 0x%lx >= AssemblyRosterHeader->EntryCount: 0x%lx$SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: AssemblyRosterIndex: 0x%lxSXS: AssemblyStorageRoot: %pSXS: Callback : %p$SXS: %s() passed the empty activation context$SXS: RtlGetAssemblyStorageRoot() unable to get activation context data, storage map and assembly roster header. Status = 0x%08lx$SXS: RtlGetAssemblyStorageRoot() unable to resolve storage map entry. Status = 0x%08lx
              • API String ID: 0-861424205
              • Opcode ID: d1ff0401dd6dea8be569764e435cf85417c46d2a73bce94b41f50b6efbd0407b
              • Instruction ID: 6a27b9264ecbe2406beb05b930bcd37390507a09ea14d9fe825d0c6eb599eab4
              • Opcode Fuzzy Hash: d1ff0401dd6dea8be569764e435cf85417c46d2a73bce94b41f50b6efbd0407b
              • Instruction Fuzzy Hash: 99313736B60212F7EB25CA9A9C81F6B7BA8DB74E50F15405DFF047B185D3B09A01CBA0
              Strings
              • Unable to build import redirection Table, Status = 0x%x, xrefs: 012581E5
              • minkernel\ntdll\ldrinit.c, xrefs: 0121C6C3
              • LdrpInitializeProcess, xrefs: 0121C6C4
              • LdrpInitializeImportRedirection, xrefs: 01258177, 012581EB
              • Loading import redirection DLL: '%wZ', xrefs: 01258170
              • minkernel\ntdll\ldrredirect.c, xrefs: 01258181, 012581F5
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: LdrpInitializeImportRedirection$LdrpInitializeProcess$Loading import redirection DLL: '%wZ'$Unable to build import redirection Table, Status = 0x%x$minkernel\ntdll\ldrinit.c$minkernel\ntdll\ldrredirect.c
              • API String ID: 0-475462383
              • Opcode ID: e93fb036a2ce2b8e501aa714790ee3d3fcaa20d86f8b7ff4c11057aec5a4db4f
              • Instruction ID: 7cdc8cfee72b56f1177b8e51159caebdd12f3c4eb63fdcfcca75ee26a1f6c7f1
              • Opcode Fuzzy Hash: e93fb036a2ce2b8e501aa714790ee3d3fcaa20d86f8b7ff4c11057aec5a4db4f
              • Instruction Fuzzy Hash: 873106716653429FD314EB29D886E3A77E4AFE4B10F05051CF9805B2D1D760ED04C7A2
              APIs
                • Part of subcall function 01222DF0: LdrInitializeThunk.NTDLL ref: 01222DFA
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01220BA3
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01220BB6
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01220D60
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01220D74
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$InitializeThunk
              • String ID:
              • API String ID: 1404860816-0
              • Opcode ID: 5dd1aee86178414964e44951e7cefc7f11ca4c5b1cfa9ed48c21e099d2a8895f
              • Instruction ID: cb211fa84941098f0332a3a3ba17a588f5f9b04a07ea112afb0b5eba3c9718a2
              • Opcode Fuzzy Hash: 5dd1aee86178414964e44951e7cefc7f11ca4c5b1cfa9ed48c21e099d2a8895f
              • Instruction Fuzzy Hash: D1425D71910716EFDB61CF28C881BAAB7F5FF44314F1445A9EA89DB241E770AA84CF60
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2227875031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_400000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID: C$a$b$d$i
              • API String ID: 0-2334916691
              • Opcode ID: ce659b5985c4fda143c39d2f74d73e31e2ae076c581b5363530e5f821b7790bf
              • Instruction ID: 9cefb149102013ebc1c11f0c7370e417644ed2b8a2a06f7475ac7e254a961867
              • Opcode Fuzzy Hash: ce659b5985c4fda143c39d2f74d73e31e2ae076c581b5363530e5f821b7790bf
              • Instruction Fuzzy Hash: 6731C371E44208ABE714EFE5EC82BEFB7B8EF45308F00451EF508A7241E779654187A9
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: 6$8$LdrResFallbackLangList Enter$LdrResFallbackLangList Exit
              • API String ID: 0-379654539
              • Opcode ID: a8b7f50d85523d91333de7b07737e5fa5f544e7993128f2c690db7ae916bf8e5
              • Instruction ID: 5b044373391e4c85103cefdfbf9c1808eb4df33caf64bfdbe85e3645b693b39a
              • Opcode Fuzzy Hash: a8b7f50d85523d91333de7b07737e5fa5f544e7993128f2c690db7ae916bf8e5
              • Instruction Fuzzy Hash: 1AC1AD70118782CFD719CF99E048B6ABBE4FF88704F05886AFA958B251E734C949CB57
              Strings
              • \Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers, xrefs: 0121855E
              • minkernel\ntdll\ldrinit.c, xrefs: 01218421
              • LdrpInitializeProcess, xrefs: 01218422
              • @, xrefs: 01218591
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: @$LdrpInitializeProcess$\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers$minkernel\ntdll\ldrinit.c
              • API String ID: 0-1918872054
              • Opcode ID: 02af401c8692936f9d5e680a7277bd77361edf4e6a57c0281a9afe72925b952b
              • Instruction ID: d092f7e0df0a548d9ba14d557ea961f2d11489c882d48fc3490ef019197e2656
              • Opcode Fuzzy Hash: 02af401c8692936f9d5e680a7277bd77361edf4e6a57c0281a9afe72925b952b
              • Instruction Fuzzy Hash: 7591A971568346BFD721DF25DC80FAFBAE8FB98684F40092EFA8492155E734D904CB62
              Strings
              • RtlpGetActivationContextDataStorageMapAndRosterHeader, xrefs: 012521D9, 012522B1
              • SXS: %s() passed the empty activation context, xrefs: 012521DE
              • SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: Peb : %pSXS: ActivationContextData: %pSXS: AssemblyStorageMap : %p, xrefs: 012522B6
              • .Local, xrefs: 012128D8
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: .Local$RtlpGetActivationContextDataStorageMapAndRosterHeader$SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: Peb : %pSXS: ActivationContextData: %pSXS: AssemblyStorageMap : %p$SXS: %s() passed the empty activation context
              • API String ID: 0-1239276146
              • Opcode ID: b400ab0c7a42da101b7af7988d5d8f8947eb52e22745902d56c9106b14a859b8
              • Instruction ID: a909687e66036b634c3c72b90ac9df7eeb1f60b885352aeb541daa94878ca443
              • Opcode Fuzzy Hash: b400ab0c7a42da101b7af7988d5d8f8947eb52e22745902d56c9106b14a859b8
              • Instruction Fuzzy Hash: E1A1D63591022ADFDB24CF58DC84BA9B7B1BF68354F3541E9EA08A7295D7709E80CF90
              Strings
              • ThreadPool: callback %p(%p) returned with background priorities set, xrefs: 012410AE
              • ThreadPool: callback %p(%p) returned with the loader lock held, xrefs: 01241028
              • ThreadPool: callback %p(%p) returned with preferred languages set, xrefs: 0124106B
              • ThreadPool: callback %p(%p) returned with a transaction uncleared, xrefs: 01240FE5
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: ThreadPool: callback %p(%p) returned with a transaction uncleared$ThreadPool: callback %p(%p) returned with background priorities set$ThreadPool: callback %p(%p) returned with preferred languages set$ThreadPool: callback %p(%p) returned with the loader lock held
              • API String ID: 0-1468400865
              • Opcode ID: 1df73a56bd6cbc9d78b0a34d1da72683e78d0083466bd974cc51099e1400f5ce
              • Instruction ID: 7372ca419a3b9832c1f9a61e8ffa686e5b297db160e4da4f5ec1c7d22cdac785
              • Opcode Fuzzy Hash: 1df73a56bd6cbc9d78b0a34d1da72683e78d0083466bd974cc51099e1400f5ce
              • Instruction Fuzzy Hash: B371D0B1A04715AFCB25DF54C884BAB7FE8AFA4794F400468F9498B146D734D588CFD2
              Strings
              • apphelp.dll, xrefs: 01202462
              • minkernel\ntdll\ldrinit.c, xrefs: 0124A9A2
              • Getting ApphelpCheckModule failed with status 0x%08lx, xrefs: 0124A992
              • LdrpDynamicShimModule, xrefs: 0124A998
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: Getting ApphelpCheckModule failed with status 0x%08lx$LdrpDynamicShimModule$apphelp.dll$minkernel\ntdll\ldrinit.c
              • API String ID: 0-176724104
              • Opcode ID: 976406e234a72ffbd3898c0a3c687b156a96e9f1a64c3ffa1b68f1714a23bafc
              • Instruction ID: fb47fa369fea1784cbfa6b89f0e6e5c0f4f679c8ab99a5350511b67920fe3483
              • Opcode Fuzzy Hash: 976406e234a72ffbd3898c0a3c687b156a96e9f1a64c3ffa1b68f1714a23bafc
              • Instruction Fuzzy Hash: CA314F75A61202EBDB39DF5DE84AE6A77B4FB84B04F16001DF902A7285D7B05981C780
              Strings
              • HEAP: , xrefs: 011F3264
              • Unable to release memory at %p for %Ix bytes - Status == %x, xrefs: 011F327D
              • HEAP[%wZ]: , xrefs: 011F3255
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: HEAP: $HEAP[%wZ]: $Unable to release memory at %p for %Ix bytes - Status == %x
              • API String ID: 0-617086771
              • Opcode ID: 017ea8ec4bff4f425af6d20948cd5ef523d158c96a76f6939d2a39fe85c26190
              • Instruction ID: 4c07c4c2038fc2025df891f1ba8baef7db003529a12a5412a2e6fbbf51124792
              • Opcode Fuzzy Hash: 017ea8ec4bff4f425af6d20948cd5ef523d158c96a76f6939d2a39fe85c26190
              • Instruction Fuzzy Hash: D692CD70A142499FDB29CF68C444BAEBBF1FF49310F18805DEA5AAB392D734A945CF50
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: (UCRBlock->Size >= *Size)$HEAP: $HEAP[%wZ]:
              • API String ID: 0-4253913091
              • Opcode ID: ec8b82db5a0fc51c6ae68b6b49e74ef55a56f79c2b9e1704cdb537a0b5fb02a2
              • Instruction ID: 7555ee3f4cd5d727c50150bbc4a4a8c3d13fc992526b7d63991daeb881e8fd3a
              • Opcode Fuzzy Hash: ec8b82db5a0fc51c6ae68b6b49e74ef55a56f79c2b9e1704cdb537a0b5fb02a2
              • Instruction Fuzzy Hash: 0DF1BF70A10606DFEB2DCF68C894B6AB7B6FF48304F14416DE65A9B342D730E981CB91
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID: $@
              • API String ID: 2994545307-1077428164
              • Opcode ID: 9ff3b14ddaf0f65bdf4ff1867dbe66e656d5c929453712954518e4fbdd3bbdec
              • Instruction ID: da31a0b7ed7f8df7f40a310907515f9455f07fc15056c1b6fa30922ea98d7a60
              • Opcode Fuzzy Hash: 9ff3b14ddaf0f65bdf4ff1867dbe66e656d5c929453712954518e4fbdd3bbdec
              • Instruction Fuzzy Hash: C9C296716293429FD726CF28C441B6BBBE5BF88714F048A1DFAC987282D774E805CB52
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: FilterFullPath$UseFilter$\??\
              • API String ID: 0-2779062949
              • Opcode ID: 09b75b6e1f335e989eb635bf30c58af401d362c394981a5e23baccc1b4b03eef
              • Instruction ID: cd2e29c0cf6bcb52347d0824c3e486a8051d4ca9baea49e3e2bc02d44b581d69
              • Opcode Fuzzy Hash: 09b75b6e1f335e989eb635bf30c58af401d362c394981a5e23baccc1b4b03eef
              • Instruction Fuzzy Hash: C1A1607192162A9BDB31DF68DC88BE9B7B8FF44710F1001EAEA09A7250D7359E84CF50
              Strings
              • LdrpCheckModule, xrefs: 0124A117
              • Failed to allocated memory for shimmed module list, xrefs: 0124A10F
              • minkernel\ntdll\ldrinit.c, xrefs: 0124A121
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: Failed to allocated memory for shimmed module list$LdrpCheckModule$minkernel\ntdll\ldrinit.c
              • API String ID: 0-161242083
              • Opcode ID: 5f99fcd9cae10e4232d8bd34318c6d5185432df88df107e2b4207b841bf2ebfb
              • Instruction ID: a5382a8b999eba52605a28a27c71a06c70574dc520b7aaddb1166f925ccfa075
              • Opcode Fuzzy Hash: 5f99fcd9cae10e4232d8bd34318c6d5185432df88df107e2b4207b841bf2ebfb
              • Instruction Fuzzy Hash: E1710070E202069FEB2ADF68D985BBEB7F4FB44204F04412DE506E7292E774A981CB54
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: ((PHEAP_ENTRY)LastKnownEntry <= Entry)$HEAP: $HEAP[%wZ]:
              • API String ID: 0-1334570610
              • Opcode ID: 4eca2511a71f1552cdbe4db0eaf14382b006789e9df9cea5ae75df11050e7034
              • Instruction ID: 76c2db6cc6757dd2706e313753cc26cbc593d56eee4b85a1d03f0bb9eef39754
              • Opcode Fuzzy Hash: 4eca2511a71f1552cdbe4db0eaf14382b006789e9df9cea5ae75df11050e7034
              • Instruction Fuzzy Hash: 2061CF74610306DFDB2DCF28C480B6ABBE2FF49704F14855DE99A8B296D770E881CB91
              Strings
              • LdrpInitializePerUserWindowsDirectory, xrefs: 012582DE
              • minkernel\ntdll\ldrinit.c, xrefs: 012582E8
              • Failed to reallocate the system dirs string !, xrefs: 012582D7
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: Failed to reallocate the system dirs string !$LdrpInitializePerUserWindowsDirectory$minkernel\ntdll\ldrinit.c
              • API String ID: 0-1783798831
              • Opcode ID: 9c5ffa52b2f91a739305a6f644b9c0c202ba8de7a7db70fd9e825f84096ff94b
              • Instruction ID: 118755526d1af5b619c275ab2005ed5125c0717a4133be506b2f70ceea68a7cb
              • Opcode Fuzzy Hash: 9c5ffa52b2f91a739305a6f644b9c0c202ba8de7a7db70fd9e825f84096ff94b
              • Instruction Fuzzy Hash: A1415575961302ABD729EB68E888B6B7BECEF54750F00452EFA44C3294E7B4D800CB91
              Strings
              • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings, xrefs: 0129C1C5
              • PreferredUILanguages, xrefs: 0129C212
              • @, xrefs: 0129C1F1
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: @$PreferredUILanguages$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings
              • API String ID: 0-2968386058
              • Opcode ID: 8a31fa53d49676ad918ac6c4986deea5e2aaf6e9a736fdab4f611cb81c676cae
              • Instruction ID: 897280a3b713e4df9959d53e8115775e8f2317116ca895f7e728b3f6da519f46
              • Opcode Fuzzy Hash: 8a31fa53d49676ad918ac6c4986deea5e2aaf6e9a736fdab4f611cb81c676cae
              • Instruction Fuzzy Hash: 59418371E2021AEBDF15DBDCC891FEEBBB8AB14704F1040AAE605B7280D7749A44CB90
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: @$LdrpResValidateFilePath Enter$LdrpResValidateFilePath Exit
              • API String ID: 0-1373925480
              • Opcode ID: 32def03cbffa1f83c45344a8a58677a00e45c473f3e2f0e5b8d76921d8c02226
              • Instruction ID: c67a46d0e3d66de2eaacd54a3ba53bc401e69c11128682553abd783e0a1fa82a
              • Opcode Fuzzy Hash: 32def03cbffa1f83c45344a8a58677a00e45c473f3e2f0e5b8d76921d8c02226
              • Instruction Fuzzy Hash: 15412671A2068A8FEB25EBD9D840BAEBBB8FF55344F14045ADA11EB791D7748901CB10
              Strings
              • Import Redirection: %wZ %wZ!%s redirected to %wZ, xrefs: 01264888
              • LdrpCheckRedirection, xrefs: 0126488F
              • minkernel\ntdll\ldrredirect.c, xrefs: 01264899
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: Import Redirection: %wZ %wZ!%s redirected to %wZ$LdrpCheckRedirection$minkernel\ntdll\ldrredirect.c
              • API String ID: 0-3154609507
              • Opcode ID: 30b2679674ec0f703067624c9fbef821d071a0ef707f19a6535ec8f759c9da53
              • Instruction ID: 07ef43eae5988febb1f36c728fc9945c77f19761f954ec9d8b341b2c39cd2896
              • Opcode Fuzzy Hash: 30b2679674ec0f703067624c9fbef821d071a0ef707f19a6535ec8f759c9da53
              • Instruction Fuzzy Hash: E841E432A252D28FDB26EE6CD940A267BECEF89650B06015DEEC4D73D1D330D880CB81
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: (ROUND_UP_TO_POWER2(Size, PAGE_SIZE) == Size)$HEAP: $HEAP[%wZ]:
              • API String ID: 0-2558761708
              • Opcode ID: 221515c834b313d93a14af42ddb08995dc3c60678041ad1a33c17a23a056325d
              • Instruction ID: 83f535809d8dc1257f310efd8f73f38db76dadcdf9fd4232fb1937deace515a4
              • Opcode Fuzzy Hash: 221515c834b313d93a14af42ddb08995dc3c60678041ad1a33c17a23a056325d
              • Instruction Fuzzy Hash: DF110F3032A1469FDB2DCF18C491B7AB3A6EF41A1AF19805DF546CF252DB30D841C755
              Strings
              • LdrpInitializationFailure, xrefs: 012620FA
              • minkernel\ntdll\ldrinit.c, xrefs: 01262104
              • Process initialization failed with status 0x%08lx, xrefs: 012620F3
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: LdrpInitializationFailure$Process initialization failed with status 0x%08lx$minkernel\ntdll\ldrinit.c
              • API String ID: 0-2986994758
              • Opcode ID: 168e8c995fb318da250f75b36d50ad73e9924ddc5610f86b6194daa48f45ffe3
              • Instruction ID: 12c15f4f51f709e13c3e66b985f8d74bf071e8e699c4fbfc66960a29683e5acf
              • Opcode Fuzzy Hash: 168e8c995fb318da250f75b36d50ad73e9924ddc5610f86b6194daa48f45ffe3
              • Instruction Fuzzy Hash: 79F0AF75A51259FBE728E64CDC4AFAA37ACEB50B54F510069FB0077286E2F0A940CA91
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: ___swprintf_l
              • String ID: #%u
              • API String ID: 48624451-232158463
              • Opcode ID: c7037c0a375a38dd40194f982f7111b7df5ebea3b4972681cf2b3bc00af1b5c8
              • Instruction ID: c5da81e048b86f67c74f40ca25ef8f6518835fbb5651200a936d74facd4b4577
              • Opcode Fuzzy Hash: c7037c0a375a38dd40194f982f7111b7df5ebea3b4972681cf2b3bc00af1b5c8
              • Instruction Fuzzy Hash: 3B715C71A1014A9FDB09DFA8C990FAEB7F8BF08304F154069EA01E7291EB34ED41CB64
              Strings
              • LdrResSearchResource Exit, xrefs: 011EAA25
              • LdrResSearchResource Enter, xrefs: 011EAA13
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: LdrResSearchResource Enter$LdrResSearchResource Exit
              • API String ID: 0-4066393604
              • Opcode ID: 1047135352db18e1b2d483dbadba9f8ae2eb62ec9937dd1934f1f3706cf1b2b3
              • Instruction ID: 746ee8556833acaeab779f975335d7563cb5f3a27a701f08ba10e741d67a9a08
              • Opcode Fuzzy Hash: 1047135352db18e1b2d483dbadba9f8ae2eb62ec9937dd1934f1f3706cf1b2b3
              • Instruction Fuzzy Hash: DCE1AF71A10619EBEF2ECED9E988BAEBBF9BF54310F114426FA01E7241D7749940CB50
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: `$`
              • API String ID: 0-197956300
              • Opcode ID: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
              • Instruction ID: 24aa55d2486130865a3a68a58dfd35c7a81d11e0a711796c68441ad79c87838a
              • Opcode Fuzzy Hash: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
              • Instruction Fuzzy Hash: D3C1CF312243429FEB25CF28C841B6BBBE5EFC4718F484A2DF6968B290D7B4D509CB41
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID: Legacy$UEFI
              • API String ID: 2994545307-634100481
              • Opcode ID: 84835791ae00c467d363870dd7f8c615a1efc0d537c5fd87c6294cf02afe6033
              • Instruction ID: cd5a18bd68672719533e450472f8c6392d5b0db40eebbb6949de02367bcb016a
              • Opcode Fuzzy Hash: 84835791ae00c467d363870dd7f8c615a1efc0d537c5fd87c6294cf02afe6033
              • Instruction Fuzzy Hash: E1618E72E202199FDB58DFA8C984BADFBB5FF54700F15406DEA09EB251D731AA00CB50
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: @$MUI
              • API String ID: 0-17815947
              • Opcode ID: 92ffa636e9fb212c3bc6668f34f64580275d8da9b4baf8d924810a00a55613d3
              • Instruction ID: 3570b4ae54599248ae421e511f1fdb45a93b23a7c901684319326b8d910684be
              • Opcode Fuzzy Hash: 92ffa636e9fb212c3bc6668f34f64580275d8da9b4baf8d924810a00a55613d3
              • Instruction Fuzzy Hash: 8F514871D1125EAFDF11EFA9CC80BEEBBB8EB14754F100129E610B7290D7349905CB60
              Strings
              • kLsE, xrefs: 011E0540
              • TerminalServices-RemoteConnectionManager-AllowAppServerMode, xrefs: 011E063D
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: TerminalServices-RemoteConnectionManager-AllowAppServerMode$kLsE
              • API String ID: 0-2547482624
              • Opcode ID: fd2ce9eca7ca303a42aacbdb8f919c6c4344d6ee3af1282720a552aa9168e28d
              • Instruction ID: e212525f276e73c630a0ec777a79680f44ccaf0acfbedbf624855c86a443573a
              • Opcode Fuzzy Hash: fd2ce9eca7ca303a42aacbdb8f919c6c4344d6ee3af1282720a552aa9168e28d
              • Instruction Fuzzy Hash: 2B51AE71604B429BD728DFA8C4487A7BBE4AF8C304F14483EE6EA87241E7B4D545CF92
              Strings
              • RtlpResUltimateFallbackInfo Exit, xrefs: 011EA309
              • RtlpResUltimateFallbackInfo Enter, xrefs: 011EA2FB
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: RtlpResUltimateFallbackInfo Enter$RtlpResUltimateFallbackInfo Exit
              • API String ID: 0-2876891731
              • Opcode ID: 5b034182f08070d1ce91f7dcd5ca35f272c04673da296af1b55947bc763896a5
              • Instruction ID: 6d75fe8bd7daf7e402c2a2a324c60265fa2bd1741bef9c68a726047a73e6e856
              • Opcode Fuzzy Hash: 5b034182f08070d1ce91f7dcd5ca35f272c04673da296af1b55947bc763896a5
              • Instruction Fuzzy Hash: 7C41D130A18A46CBDB1DCF99E844B6DBBF4FF84704F2540A9EA14DB291E3B5D940CB51
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID: Cleanup Group$Threadpool!
              • API String ID: 2994545307-4008356553
              • Opcode ID: 37a5d0a7abb329c99cecf9e4b0aadc48e3cc4a0123ad68e91f0535ba2adbd95e
              • Instruction ID: 17958711976c9076a26bb058607ad7247a08071a7f0da5edba923efe8fb54422
              • Opcode Fuzzy Hash: 37a5d0a7abb329c99cecf9e4b0aadc48e3cc4a0123ad68e91f0535ba2adbd95e
              • Instruction Fuzzy Hash: 310144B2265780EFD311CF14CD49F2677E8E7A4725F008839E208C7188E334E800CB86
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: MUI
              • API String ID: 0-1339004836
              • Opcode ID: 1715ec7ac1b6ad54b32c571081b1367eecfbcd162afe322793cbb88f4d7b3848
              • Instruction ID: afdae4546ccebb93587afd29d7b158ba5b644f6166b71e67ad3b5196d1d16899
              • Opcode Fuzzy Hash: 1715ec7ac1b6ad54b32c571081b1367eecfbcd162afe322793cbb88f4d7b3848
              • Instruction Fuzzy Hash: A9826D75E00A198FEF28CFE9D988BEDBBF1BF44350F148169D919AB250D7309981CB91
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID: 0-3916222277
              • Opcode ID: 608c49749671b1ccbb1c5f4c2b69141e181f69693c55636f42380434824ce463
              • Instruction ID: 135999d5eb1f2c29f384438d2a92662ff6085096dbc1d5f4518d5e7fa7e1ccd8
              • Opcode Fuzzy Hash: 608c49749671b1ccbb1c5f4c2b69141e181f69693c55636f42380434824ce463
              • Instruction Fuzzy Hash: C9916D71A5021AAFEB25DB95DC85FAEBBB8EF08B50F100125F600AB1D1D775AD40CBA0
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID: 0-3916222277
              • Opcode ID: aeb417126d3e1fac72c57c30ce66e0dd05ea6ff39c9beb7439ad715f3e73b893
              • Instruction ID: 90e36e2a6bce234041759682024ef670060ced087b529ad63d83ea87ba419670
              • Opcode Fuzzy Hash: aeb417126d3e1fac72c57c30ce66e0dd05ea6ff39c9beb7439ad715f3e73b893
              • Instruction Fuzzy Hash: A091D03192260ABEDB26AFA4DC44FBFBBB9EF55740F020029F610A7291D7749D01CB50
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: GlobalTags
              • API String ID: 0-1106856819
              • Opcode ID: a34f814d8655fdd3219edfd785045acc5acc150bdfd1fdc31da06655cb46b29b
              • Instruction ID: 452fa2fde14aac68cef1570d321d6d00516e0c0f19b5366680af41a307571aac
              • Opcode Fuzzy Hash: a34f814d8655fdd3219edfd785045acc5acc150bdfd1fdc31da06655cb46b29b
              • Instruction Fuzzy Hash: AB719EB5E2020ADFDF68CF9CD5906ADBBB1FF58710F54812EEA05A7241E7708845CB60
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: .mui
              • API String ID: 0-1199573805
              • Opcode ID: a009d88da286e5e5af58e5475dee33505e559336ff25a0036ace6995c8de11dd
              • Instruction ID: 82c07fcd3a5141e45b2e9b74d3551f26dc1f291f47a327ad485c4cd321c804a4
              • Opcode Fuzzy Hash: a009d88da286e5e5af58e5475dee33505e559336ff25a0036ace6995c8de11dd
              • Instruction Fuzzy Hash: A251A572D2126BDBDF14FF99D840BAEFBB4AF14A14F054129EA11BB280D3749C01CBA4
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: EXT-
              • API String ID: 0-1948896318
              • Opcode ID: 8e868b000e253141968b63db2456dbaa2307b4ce408548ef30cd15dfd1b887b0
              • Instruction ID: fd6d78da8ffde7f749942adcd6336139b4ad2e4dbfc64ffd9ce4af217780922e
              • Opcode Fuzzy Hash: 8e868b000e253141968b63db2456dbaa2307b4ce408548ef30cd15dfd1b887b0
              • Instruction Fuzzy Hash: 8B41C27250A712ABD718DA75C880B6FBBD8AF88718F060A2DF784D7190E774D904C793
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: BinaryHash
              • API String ID: 0-2202222882
              • Opcode ID: a8044a1593af28fce75e44d55b3c63f4deebddb17656abf6ed8160da2a47cf98
              • Instruction ID: 5ad9a27e99cc34c8532a23c7a6af791c9c676ace7b56ab3d2797378a792de1c7
              • Opcode Fuzzy Hash: a8044a1593af28fce75e44d55b3c63f4deebddb17656abf6ed8160da2a47cf98
              • Instruction Fuzzy Hash: 4D4166B1D1022DABDF61DA50CC84FEEB77CAB55714F0045A5EB08AB140EB709E99CF94
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: #
              • API String ID: 0-1885708031
              • Opcode ID: cb44e8ec444a12789fa1a3a8a7442bfe99c98fc2383212b0e3d864f3ec0919de
              • Instruction ID: 9c9ffa8928989a036823c2aa007604b717d12cebc452c0e96ca1a49b8b24eb30
              • Opcode Fuzzy Hash: cb44e8ec444a12789fa1a3a8a7442bfe99c98fc2383212b0e3d864f3ec0919de
              • Instruction Fuzzy Hash: FA311831E20B5A9AFB22DB69C858BAF7BB8DF05704F14402CEA41AB282D775D805CB50
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: BinaryName
              • API String ID: 0-215506332
              • Opcode ID: 0c39ad61799001bc3dfb7d8770bc248e41afbb21aab726686c5a951515e8b7bf
              • Instruction ID: da3e5803874edf4d5d3f5d4972d07213aaddefadb0983b54187769f916c66ba0
              • Opcode Fuzzy Hash: 0c39ad61799001bc3dfb7d8770bc248e41afbb21aab726686c5a951515e8b7bf
              • Instruction Fuzzy Hash: 82310336910616AFEB15DA58C881E7FBB78EB80720F014129EE01A7250F730DE10DBE0
              Strings
              • AVRF: AVrfDllUnloadNotification called for a provider (%p) , xrefs: 0126895E
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: AVRF: AVrfDllUnloadNotification called for a provider (%p)
              • API String ID: 0-702105204
              • Opcode ID: 2882fc2e306f1ff2994238c64842f4849852d8b011f8ea81b7e41961abf0893c
              • Instruction ID: 02a9ccd2798075242fa889e2aa88202d3349a68deedade98e317f3e73dbfb3f2
              • Opcode Fuzzy Hash: 2882fc2e306f1ff2994238c64842f4849852d8b011f8ea81b7e41961abf0893c
              • Instruction Fuzzy Hash: 2C01F7322323029FEA345B55D88CB667B6DEF95658B04001CF74106791CBB0A8C5C792
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3956ceab8c3dc459a83210332e2377a450a7cb5e8b3b40c7b6b879a3e91b2c3e
              • Instruction ID: c64b5ab69551c022651e7eda0f56324d8b75ed705c309f414c55c77d3c384afc
              • Opcode Fuzzy Hash: 3956ceab8c3dc459a83210332e2377a450a7cb5e8b3b40c7b6b879a3e91b2c3e
              • Instruction Fuzzy Hash: A742D531629342DFDB15EF68C890A6BBBE5EF94300F18492DFB8297291D770D845CB52
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1f9c54349c4a0dae3be21f08c43b76aef9313d4a2be227908e8ceb6415709115
              • Instruction ID: d0538fd5b5257553900ddbceb3b06e55009cdf5ac57d9f5029770506bf9e76e5
              • Opcode Fuzzy Hash: 1f9c54349c4a0dae3be21f08c43b76aef9313d4a2be227908e8ceb6415709115
              • Instruction Fuzzy Hash: A9427F75E102199FEB25CF69C885BAEBBF5FF48300F148199EA49EB242D7349981CF50
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 446d4e3132a8c9f74714ae425da735fc315a118a240e036034da03ea6c138d85
              • Instruction ID: d8e3d7e6359a1f37469ec5540990f04bcaad4202e10d06910778959c396ffdc8
              • Opcode Fuzzy Hash: 446d4e3132a8c9f74714ae425da735fc315a118a240e036034da03ea6c138d85
              • Instruction Fuzzy Hash: FE320E70A207568FEB29CF69C8447BEBBF2FF86304F24411DD6869B285E774A845CB50
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e66fa67e7a92acf064c3b914ebec33c7d849f2bdc546aed92256003e0cb9db7d
              • Instruction ID: 69384787518310f77ef25b9c21d2fad54f142636333cfb74518870e309156f9c
              • Opcode Fuzzy Hash: e66fa67e7a92acf064c3b914ebec33c7d849f2bdc546aed92256003e0cb9db7d
              • Instruction Fuzzy Hash: CF22C3706366628FEB25EF2DC051376BBF1AF44304F08845BDA868B2CADB75D452DB60
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d9cf1f273d698de652e579128ecab6f1f818a09ffe23e0d576dcab90a1f8000c
              • Instruction ID: fef020c628963e93e5d097e2ea63bf8536d868c7edfc65106a23bfbbbdd4e529
              • Opcode Fuzzy Hash: d9cf1f273d698de652e579128ecab6f1f818a09ffe23e0d576dcab90a1f8000c
              • Instruction Fuzzy Hash: 4A32DE70A00615CFDB29CFA8C484BAEBBF1FF58310F548569EA56AB391D730E851CB91
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e8a3620866af67e9ba5ee0a5ffcffd4608486dc740fad13053f627f14a392904
              • Instruction ID: e61b1fd3c0a45c1dfea7337931e705a1c2b04a9d2eb7d00c67e56bc76af7a5df
              • Opcode Fuzzy Hash: e8a3620866af67e9ba5ee0a5ffcffd4608486dc740fad13053f627f14a392904
              • Instruction Fuzzy Hash: 76F18771E2025A9BDF1ADF99D580BAEBBF5BF48714F048219EA01AB381E774DC41CB50
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c64e30ba8f1712d29056fa8e68cbf430569c2f86167f5a41e1cdb64f24d416aa
              • Instruction ID: 83bfdf09d33ed047b6d6c7cafbb9b9976a9b6fbbc1cf6f2e4eca74ada75b6fa5
              • Opcode Fuzzy Hash: c64e30ba8f1712d29056fa8e68cbf430569c2f86167f5a41e1cdb64f24d416aa
              • Instruction Fuzzy Hash: 99D1FF72A2061A9BDF09CF69C845AFFBBF1AF88304F188169D955E7241E735E901CB60
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 44443bbd1bbebebe4bfc74f983f39e4ee6b16d1a5140d09e277aead107efe313
              • Instruction ID: 81efdc66f8b8279f99acbc2e9997b4a2d1c2a35751fda1fd63741446f87435a6
              • Opcode Fuzzy Hash: 44443bbd1bbebebe4bfc74f983f39e4ee6b16d1a5140d09e277aead107efe313
              • Instruction Fuzzy Hash: C4E1CF71608742CFC719CF68C084A6ABBE0FF98314F45896DE99987351EB30E945CF92
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1002d7abe18df3d549fbd22e769c607cda9398bfc12ab22afb9a327281718550
              • Instruction ID: 3744bba30a0b4e733c389fb260437a4dc30bb565fa5056bcfc1392e9725dcf12
              • Opcode Fuzzy Hash: 1002d7abe18df3d549fbd22e769c607cda9398bfc12ab22afb9a327281718550
              • Instruction Fuzzy Hash: 70D1F1B1A106169FDB1CDF68C881BBA77B5FF94308F06422DEA16DB281E734E951CB50
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c58da6bef63a17e65f3132630e1fabe04f2e2fb92a18dec9866503995c4710af
              • Instruction ID: 872f685b2f5badc9b8951d4f14785593545c498551f87176f425ce80f64bd049
              • Opcode Fuzzy Hash: c58da6bef63a17e65f3132630e1fabe04f2e2fb92a18dec9866503995c4710af
              • Instruction Fuzzy Hash: E0B16174A10746AFDF24DF99C940AABBBBDFF84304F10445EAA02977D4EA34E985CB10
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c61ad9210afadd02b75b489723f8fea184d45ce3a0816f7da46b339e1a5f1bc9
              • Instruction ID: 7f058dabee98a492930861b7c378eaea7b7d7c19adfedf47526c1cf892c0fde8
              • Opcode Fuzzy Hash: c61ad9210afadd02b75b489723f8fea184d45ce3a0816f7da46b339e1a5f1bc9
              • Instruction Fuzzy Hash: 9AB10431610646AFDB2DDB68C854BBEBBF7AF48300F150199E752DB292DB70E941CB90
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1b0d8fe761de45da488cb79d7e61d7b5cafebd5fb3ca6856a703869ed0d52be9
              • Instruction ID: 94b869959dc012f3961af168d27fe3e70477a025f139e6d2101dc867bea8a791
              • Opcode Fuzzy Hash: 1b0d8fe761de45da488cb79d7e61d7b5cafebd5fb3ca6856a703869ed0d52be9
              • Instruction Fuzzy Hash: 1CC15874618741CFE768CF19C484BAAB7E5FF88304F44492DEA8987291DB74E948CF92
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c1eb7beb2048f6b6e873d4e8e86c09e906ebb714f3270a695b61385752dc4d73
              • Instruction ID: c278d49f43025264abefbe7e556ed17384a809da1a8e4f099dd2cd67670ab266
              • Opcode Fuzzy Hash: c1eb7beb2048f6b6e873d4e8e86c09e906ebb714f3270a695b61385752dc4d73
              • Instruction Fuzzy Hash: 30B17270B102668BDB28DF58C890BB9B3B1EF44704F4589EDD54AE7281DB309D86CF61
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: dd10f03f65df1fe315e2b5310504e973564a7fe8e35402494cba076cde26389a
              • Instruction ID: 375ada6e8eee4386612f1cf16cdd0b1758d5f4ef374f5f534169bf2fee365898
              • Opcode Fuzzy Hash: dd10f03f65df1fe315e2b5310504e973564a7fe8e35402494cba076cde26389a
              • Instruction Fuzzy Hash: 3BA14931E206569FEB26DB5CD944BAEBBB4BF40714F060615EB00AB2D2D7749D80CBD1
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 55ff330bcb52ab6e3f7a6049a7f93f4bb7f83bb4a6574555eb37bc40e83323fa
              • Instruction ID: 33caf9cf5bee4b7b20cb54764a549f79f68e02e08f53c575144f24242cc16d62
              • Opcode Fuzzy Hash: 55ff330bcb52ab6e3f7a6049a7f93f4bb7f83bb4a6574555eb37bc40e83323fa
              • Instruction Fuzzy Hash: 73A1E070B2062AEFDB25DF69C890BBEB7B1FF54318F004129EA05A7281DB74E855CB54
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9ae952adde809ab9d3e136edb8a3e30517a732236f9e87a9f70946852534de17
              • Instruction ID: f70d2b98f566ad8b3655c240ac5d567bad17edc124dea2152f51c7e581126a16
              • Opcode Fuzzy Hash: 9ae952adde809ab9d3e136edb8a3e30517a732236f9e87a9f70946852534de17
              • Instruction Fuzzy Hash: 59A1D172A24692EFC715EF18C9C0BAAB7E9FF58344F05052CE6869B652D334ED01CB91
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6ce3715ed4799cd0a993ea830d382c3077ea0590534c70b07cf682ff4d409637
              • Instruction ID: c58c2cf929e0a846039d937582daec644f4dfcfd96c19b69062956fef88f455a
              • Opcode Fuzzy Hash: 6ce3715ed4799cd0a993ea830d382c3077ea0590534c70b07cf682ff4d409637
              • Instruction Fuzzy Hash: 90B13871E1061ADFDF29CFA9C880AEDBBB5FF48350F148169EA14AB355D730A941CB90
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c20ecef9e84168ecbc6c880b5737f4ccf9eb85217a1af10c03a765dd7f9925af
              • Instruction ID: f7057a1ccfe59b9cf1ba59174800dae89beaa381fd01555a73fe4dc57a6758d5
              • Opcode Fuzzy Hash: c20ecef9e84168ecbc6c880b5737f4ccf9eb85217a1af10c03a765dd7f9925af
              • Instruction Fuzzy Hash: 10919371D10216AFDB15CFA8D884BBEBFB9AF48710F154169E610EB381D774E9508BA0
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8334e5d43cf58ce8b69eb414a1e2be118fe2dfefc8a81a14ec3919d68eecc584
              • Instruction ID: de8cec38ddac4f289656c96f609432ad96805ec899f84a50d22ef0ef135a6f40
              • Opcode Fuzzy Hash: 8334e5d43cf58ce8b69eb414a1e2be118fe2dfefc8a81a14ec3919d68eecc584
              • Instruction Fuzzy Hash: 69911435A11616CBEB2CDB5CC444BBEBBA1EF98718F06406DEB05DB2A0E734D941CB91
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e20f57e4ff007d65908e0e6f7ea2c5d260c397918ed067619b1479e5480266a4
              • Instruction ID: e7e71d7123bd0be3b4b39a3f34469a644099466b1a51c3ddab0810abc6a01e5d
              • Opcode Fuzzy Hash: e20f57e4ff007d65908e0e6f7ea2c5d260c397918ed067619b1479e5480266a4
              • Instruction Fuzzy Hash: 0281A071A2060A9FDF18CF98C481AAEBBF2FF94310F58856DDA169B344D774E901CB80
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8e324be89a5376be42a698097ce8e23ca1833e768daefe577ad789360e64f52b
              • Instruction ID: 86b3217d772e35d4ec56f4eb73ca294e867f5394abe649a16b918c579d0906e7
              • Opcode Fuzzy Hash: 8e324be89a5376be42a698097ce8e23ca1833e768daefe577ad789360e64f52b
              • Instruction Fuzzy Hash: B581A57191060AEFDB26CFA9C880BEEBBF9FF58314F114429EA55A7214D770AC45CB60
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7ec42828c5890c8475a65c11ae2751c7be6c1e2da1a0a24052aabb9507d94e26
              • Instruction ID: 103dd64a8f48cc61dae0dd863a48ca2e7fa0d2416a63625adfb6aa110a913aa8
              • Opcode Fuzzy Hash: 7ec42828c5890c8475a65c11ae2751c7be6c1e2da1a0a24052aabb9507d94e26
              • Instruction Fuzzy Hash: AE71A075D2566ADBCB29CFA9D450BFEBBB1FF58710F15411AEA42AB350D3709800CB90
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: f041394651127446917a257258e23eb1578668c3bad53106be05fe7417c3610e
              • Instruction ID: f86dcba374da8ad55658d3b50387116d85b98b5c211f0e631cd0700e7d77f066
              • Opcode Fuzzy Hash: f041394651127446917a257258e23eb1578668c3bad53106be05fe7417c3610e
              • Instruction Fuzzy Hash: E3718070D21246EFDF20EF5DEA58A9EBBF9FF94300B10415AE710AB258C7358942CB54
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0555a0d830dd4ca43615273e41787080ee8ce94d637c8bb63df7c80aa6e6bcd8
              • Instruction ID: 1fb3cbecb8694fee4bcddd77fa1e6a2dee0e28ffa705a42744a5b8d75450327f
              • Opcode Fuzzy Hash: 0555a0d830dd4ca43615273e41787080ee8ce94d637c8bb63df7c80aa6e6bcd8
              • Instruction Fuzzy Hash: B771E2316146429FD719DF2CC480B2AB7E5FF88314F0585AAE999CB352DB34DC45CB92
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
              • Instruction ID: e129c3e99391acc5895278b3b1d4e8f33c5ccc7da77f1ef9c1746055b1cd7ff9
              • Opcode Fuzzy Hash: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
              • Instruction Fuzzy Hash: A9718F71A1061AEFCB14DFA9C944EEEBBB8FF48304F104569E605E7290DB34EA41CB94
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 35b27d85617dbdd2b3bdd526ab722acdf82ca2c8f4bc5b33a9f867d18f5d250e
              • Instruction ID: 6dea6ab627e6408d6c9f301d524494a5450dd1a13fb71d966ec46d5c6cc4486e
              • Opcode Fuzzy Hash: 35b27d85617dbdd2b3bdd526ab722acdf82ca2c8f4bc5b33a9f867d18f5d250e
              • Instruction Fuzzy Hash: 6E71EF32260B02AFEB368F18C855F6BBBB6EB44720F144428E3168B2A0D775E944CB50
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3ed184a5d6ac8d9a43a4364ca2da7bc0f47f6ee381d051a515b5d737af02cfe6
              • Instruction ID: c0698247a56c558125ddc5d31dca9b29a861d04043775f167b27c93d6e6e5f1e
              • Opcode Fuzzy Hash: 3ed184a5d6ac8d9a43a4364ca2da7bc0f47f6ee381d051a515b5d737af02cfe6
              • Instruction Fuzzy Hash: D181E072A15346CFDB2CCF99E588BADBBF2BF48314F154169EA00AB291C7749D40CB90
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 05ff0d3914c3b2e79f3323e5daae04b9da2ed2a34f2f6f694269c50f85705daf
              • Instruction ID: 53c09dac4380c15636e63d00af765cf11a2e857ee4308cb427831ac633df170f
              • Opcode Fuzzy Hash: 05ff0d3914c3b2e79f3323e5daae04b9da2ed2a34f2f6f694269c50f85705daf
              • Instruction Fuzzy Hash: 4B712B71E2021ABFDF15DF94C881FEEBBB9FB04350F104129E625A7290E774AA45CB90
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5d495adf6de1d9c46b15351766bc633c6a57ac0eb508302efe8d2aad0cbd460f
              • Instruction ID: 73bfee21f6cd81af43867c5460fb7254796f37f1f0c91f09f9f8c3fadcd1fc10
              • Opcode Fuzzy Hash: 5d495adf6de1d9c46b15351766bc633c6a57ac0eb508302efe8d2aad0cbd460f
              • Instruction Fuzzy Hash: 4D51D172924752AFDB11DE6CC884E6BBBE8EBC5750F010929FA44DB150D770ED04CBA2
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b9f9b602292603d50cf805872974e512c5e2c5db7643f4637da6e806afbac7bb
              • Instruction ID: 93110f0c7045b7a77297c919facd944b8106d763687ef54c744065252355cc73
              • Opcode Fuzzy Hash: b9f9b602292603d50cf805872974e512c5e2c5db7643f4637da6e806afbac7bb
              • Instruction Fuzzy Hash: 1651DD70921706EBD720EF5AC880A6BFBF9FF54710F50461EE292976E1C7B0A940CB50
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: c6e8dd45e306b4fbd3695c602b17ca7a167b273e576cee58406584d0781318d0
              • Instruction ID: 98b5d6667601699d282362cddaa3c629f70989f1e6b3b0e8898be4bf965069ec
              • Opcode Fuzzy Hash: c6e8dd45e306b4fbd3695c602b17ca7a167b273e576cee58406584d0781318d0
              • Instruction Fuzzy Hash: 32516071260616EFCB26EF69C980F6AB3F9FF14744F42042EEA5197660D734E941CB50
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2d627b696558bcf57f9afd8157832f8af091592f7f90d2207ff666dc986d85e8
              • Instruction ID: 5974a84cb9b348957cdc2384173a747b83b41f164d0c8bda1d4fadc4051b5bde
              • Opcode Fuzzy Hash: 2d627b696558bcf57f9afd8157832f8af091592f7f90d2207ff666dc986d85e8
              • Instruction Fuzzy Hash: A4519C716193829FD754EF29C880A6FBBE5BFD8208F54492DF689C7290E730D905CB52
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0d00e1a585e90d849ff2aa0c284c489e35fe4af6d50ef2092e2439a8439fa3dd
              • Instruction ID: 1d748da14f05caf43b2fee38e716c1fdcf678baaaa4f42ed2a721cbb67a61656
              • Opcode Fuzzy Hash: 0d00e1a585e90d849ff2aa0c284c489e35fe4af6d50ef2092e2439a8439fa3dd
              • Instruction Fuzzy Hash: 7A51A071D1025AAFDF1ADF98C440BFEBBB9AF44314F048269EB01AB291D774D944CB90
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: b631fe1f52208cb18c131e5291272d5615ec6cd8030edbb8dd5fe07777775a1e
              • Instruction ID: e394b5ebb8063222f174ef3fc887108824f76c73b2db5d04dd603f186ea645e5
              • Opcode Fuzzy Hash: b631fe1f52208cb18c131e5291272d5615ec6cd8030edbb8dd5fe07777775a1e
              • Instruction Fuzzy Hash: 3351C735D2021AEFEF21DF94C885BAEBB7DBF00324F164665D612671D0E7709E808BA0
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 433a3d349a7b087d2ed42c3653e7e30aee9f074867d52974eec7ade3d7a26591
              • Instruction ID: 88bdd03a601aa9a780d4c34f3f3ccb35645c18a21508eb315098778ff7bfdac0
              • Opcode Fuzzy Hash: 433a3d349a7b087d2ed42c3653e7e30aee9f074867d52974eec7ade3d7a26591
              • Instruction Fuzzy Hash: FB41D5707216029BD729DB2DC894B7BBB9BEF90721F848519EA15C7280E770D801CB91
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7af1795f0288039a340642166612c7320115d31d1c0aa63bdc6e510b08a87357
              • Instruction ID: 6b209c79440ec0b4db86a861e64ea76237fd69dd4635cab4e43c8c0bafbebeb2
              • Opcode Fuzzy Hash: 7af1795f0288039a340642166612c7320115d31d1c0aa63bdc6e510b08a87357
              • Instruction Fuzzy Hash: E551CE71E10216DFCB20EFA9D8849AEBBB9FF58318B204519D685A3748D734ED91CBD0
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 601b61c28d80ddbc1fcb8a4eb5aa1b7ae0f64a9a83eaa8205af41bc0719aff8d
              • Instruction ID: d9763821c53fa2d4ec13259f3cc072ff1679e422c9b60248e2b2eec707fc50f2
              • Opcode Fuzzy Hash: 601b61c28d80ddbc1fcb8a4eb5aa1b7ae0f64a9a83eaa8205af41bc0719aff8d
              • Instruction Fuzzy Hash: E141EB71A66242ABDF29EE68F8C9B7A36A5EB75708F41002CFE019B245D7B1D850C760
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7622aca86cac28a0acf118705f69cf0cc3cb486fddc0e93dd45dfd5b9ea80ff7
              • Instruction ID: 21b3f85ceeb73fb17a659677a53e4ed7bcafa1abfceb9b0c1ca11bce7ef13656
              • Opcode Fuzzy Hash: 7622aca86cac28a0acf118705f69cf0cc3cb486fddc0e93dd45dfd5b9ea80ff7
              • Instruction Fuzzy Hash: 48412B316207079FCB25CF18C994A6AB7F9FF80314B44462EEA1287641EB30EC08C7D0
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 68ac0a36cff2c0433e6e5f3019cd776ad05b440ae4168beb89d03988daa0cd6a
              • Instruction ID: c67f768f96fef320e718e0cae506e31fdc2f90df1b033f0afea219f362d1139a
              • Opcode Fuzzy Hash: 68ac0a36cff2c0433e6e5f3019cd776ad05b440ae4168beb89d03988daa0cd6a
              • Instruction Fuzzy Hash: 6441BF35921216DBDB14DF98C480AEEB7B4FF68710F24811AF915F7244D7749D81CBA8
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6ba73d432fe534c3b9e0dc7c19c544b168162e0f7854956d29f8cc75cdc1f8ed
              • Instruction ID: a7df2f8bb543be448ff42c36c5a83a350470804b390689d076cb329ffa82416f
              • Opcode Fuzzy Hash: 6ba73d432fe534c3b9e0dc7c19c544b168162e0f7854956d29f8cc75cdc1f8ed
              • Instruction Fuzzy Hash: 3341F5716243029FD729DF28C884A6BB7E9FF88218F054D2DE697C3652DB75E8848B50
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f9143dc9ab32c0c56755980999bbdd100a6c23c33ec6549c8632214e05dba9ed
              • Instruction ID: a001b3ddba61ad48276a50bc9b9c666f3266198214371ff997688aa83c3b40d3
              • Opcode Fuzzy Hash: f9143dc9ab32c0c56755980999bbdd100a6c23c33ec6549c8632214e05dba9ed
              • Instruction Fuzzy Hash: 6E518C35A10216DFCB55CF9CC481AADFBB2FF84714F2482A9DA15A7351D770AE41CB90
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f6db39ad18429bf4b184e367a95c37c4d3da78ec6cc8fbbd3db8916dfd3c337e
              • Instruction ID: 93215382c92b77bed22f0856baee6bd3746df95eb8f76a0578de83585aef39f3
              • Opcode Fuzzy Hash: f6db39ad18429bf4b184e367a95c37c4d3da78ec6cc8fbbd3db8916dfd3c337e
              • Instruction Fuzzy Hash: 5251D770904657DBDB2D8BA8CC08BE8BBF1EF25318F1482A9D625972D1D73499C1CF45
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 59b6a2d4d9d04bcfc738183272f8ee4b4f47d6d1fde57d37b9694515116cdf75
              • Instruction ID: f6e9c7b54cf1dad570911ea98a02791b4b18c0cf2c6bf1f92615463f1e2d6e1f
              • Opcode Fuzzy Hash: 59b6a2d4d9d04bcfc738183272f8ee4b4f47d6d1fde57d37b9694515116cdf75
              • Instruction Fuzzy Hash: 3A41C371A106299FCF25DF68C944BEE77B8EF49740F0200A9EA08AB241D774DE85CF91
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 52a1741bb7668dbd0e330b4cee233e7836a49f18a3e4eafb0fad66dd8014cf6e
              • Instruction ID: 606f48cd078b93883375adf33e74875c508020b52733589edca16a3956a43034
              • Opcode Fuzzy Hash: 52a1741bb7668dbd0e330b4cee233e7836a49f18a3e4eafb0fad66dd8014cf6e
              • Instruction Fuzzy Hash: 95419575B20206AFEB15DF99CC85ABFBFBAAF84711F544069E60497341DA70DD40C760
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 70e0ce6e195967424d6e200309dd7816de6e22faea23392eeb9d289820c56bf1
              • Instruction ID: 91e8501cf4a4d4e40a6554247b69838240c2bfcd678d19843aaecc700f186671
              • Opcode Fuzzy Hash: 70e0ce6e195967424d6e200309dd7816de6e22faea23392eeb9d289820c56bf1
              • Instruction Fuzzy Hash: A641B3B0700B029FE72DCF68C498A26B7F9FF49314B154A6DE65A87A50E770E845CB90
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a37836cbf8107f9667d202d0e06b5b96aa4dc3125fc26b7ea586c69ba49e8422
              • Instruction ID: e7198ec58d64fffedfb18bda8a6e39d712bc823198f2421a1b62e624c16ffd59
              • Opcode Fuzzy Hash: a37836cbf8107f9667d202d0e06b5b96aa4dc3125fc26b7ea586c69ba49e8422
              • Instruction Fuzzy Hash: D341CE32D61306CFDB26DF68E494BED7BB0FB14314F850299D515AB2D2DB759900CBA0
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 43506a277113552a68527d11149e89db0858d836902539cf20a39688c420c85c
              • Instruction ID: cf3b9ff2dfe142c9fd76bcf13108ae65ee7ffd8ff79fc01a5a1ea573f53c459f
              • Opcode Fuzzy Hash: 43506a277113552a68527d11149e89db0858d836902539cf20a39688c420c85c
              • Instruction Fuzzy Hash: BF412832911642CFD72CDF89E888A9EBBF6FB95708F15806DD5019B655C335D842CF90
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: afc5a5f54078d45661ad06c407b92f679c414057c23dc6f0fbe4d00d716c9eb8
              • Instruction ID: a6d02959f23ad2f1782ac85c1495d645122a536c05128592595e10aff571d355
              • Opcode Fuzzy Hash: afc5a5f54078d45661ad06c407b92f679c414057c23dc6f0fbe4d00d716c9eb8
              • Instruction Fuzzy Hash: BD416A725183069ED71ADF69C840A6BF6E8EFC4B54F41092AFA84D7250E730DE058B93
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
              • Instruction ID: b6cc1daae16ae946784bfba797b64e433c8d8da54ce7c6146d1df3e7463973b9
              • Opcode Fuzzy Hash: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
              • Instruction Fuzzy Hash: F9416A71A10212DBDB29DE6C94407BABB71EFD0758F16806AFB458B280D733CD80CB91
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5766948bdc134128cfe06892050591f1d232d7213047b273268ca6ff255afc9d
              • Instruction ID: 513a535d9070d8e473412dd8baa9cee8c91d907a45872580709305c7d4443ead
              • Opcode Fuzzy Hash: 5766948bdc134128cfe06892050591f1d232d7213047b273268ca6ff255afc9d
              • Instruction Fuzzy Hash: 72419E71600B05EFD729CF58C844B26BBF5FF98314F25892AE549CB251E7B0E942CB91
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: cfe855aa5370e709d3beaf8d0a0824e85895befd2a0058a9eb758e5aacecaf96
              • Instruction ID: a96cf07307ae8f0e28a42781a7a02aa852b7a2c3d1830be9aabd2df724391840
              • Opcode Fuzzy Hash: cfe855aa5370e709d3beaf8d0a0824e85895befd2a0058a9eb758e5aacecaf96
              • Instruction Fuzzy Hash: 70415D71A10705EFDB24CF98C980AAABBF4FF28700B10496DE656DB255D330EA85CF94
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 231bdce4d5f5d9c4a00f14f5601487cd76cf127f27d5a653df7d2c244d8c35a8
              • Instruction ID: 4961e9a867934448ce1838c2b39e46578b68e04a5c9e68432525634503070064
              • Opcode Fuzzy Hash: 231bdce4d5f5d9c4a00f14f5601487cd76cf127f27d5a653df7d2c244d8c35a8
              • Instruction Fuzzy Hash: 014112B0951B01CFCB2AEFA8D914B68B7F9FF98314F108269C4068B2A1DB309940CF51
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b988c676ae5cb4aed4d0a3b70933560ea6476dd9ac004fa504a931405a0e656b
              • Instruction ID: 1944ff1ca860c86b9b72f60a816735cfc15845a476ce9f6cf9507031184bc425
              • Opcode Fuzzy Hash: b988c676ae5cb4aed4d0a3b70933560ea6476dd9ac004fa504a931405a0e656b
              • Instruction Fuzzy Hash: 723179B2A50246DFDB52CF68C0407A9BBF1EB19724F2081AED519EB251D3769902CB90
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1bf9001e1e9d604867b27e77416d0660077563e64e2dd25f7c11e9830ae590c1
              • Instruction ID: bd23df731ada03b56f000e5f83906aa3145ff1161c484210d9bc76bce4a96033
              • Opcode Fuzzy Hash: 1bf9001e1e9d604867b27e77416d0660077563e64e2dd25f7c11e9830ae590c1
              • Instruction Fuzzy Hash: 3D419071914341AFD760DF29C845BABBBE8FF88654F004A2EF598C7291D770D944CB92
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 23e12337f982b96e97d3d2f9de720b324043e7dc82191ea013ff3e74f0441b59
              • Instruction ID: 8c20e0bd7614754ab76e80ab27957e7fbfd2ae53d659bdec906d21b79870b724
              • Opcode Fuzzy Hash: 23e12337f982b96e97d3d2f9de720b324043e7dc82191ea013ff3e74f0441b59
              • Instruction Fuzzy Hash: 8741F2B1E05616AFDB09DF68C880AA9B7B1BF44764F258229D815A7280D734ED49CBD0
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 82058720a9f4956a86561935c25a5b8a34b5a5a1ad5e2bc6eb51bad217bc3e3f
              • Instruction ID: b969b5c42f99ba206d99877c25d9e7fe8812e53c31a4847eb62c6de679a8ca9b
              • Opcode Fuzzy Hash: 82058720a9f4956a86561935c25a5b8a34b5a5a1ad5e2bc6eb51bad217bc3e3f
              • Instruction Fuzzy Hash: A741BF726146529FC320DF68D840A7AB7A9FFC8700F14062DFA94976C0E730ED44DBAA
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9c5b9b3359c5a66ebd0636851642d762fd4199802d9b48e351bec4dcfc26f139
              • Instruction ID: dd6741aa5cf442320c4cd44a3a2eb942c7572627746cdf60b0e4d501197e32a9
              • Opcode Fuzzy Hash: 9c5b9b3359c5a66ebd0636851642d762fd4199802d9b48e351bec4dcfc26f139
              • Instruction Fuzzy Hash: 6E41F3306007028BD72DCFA8D898B2ABBEAEF84354F15442DE641DB691EB74D841CB91
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5fcfd42d316fb6b60c2ad2893012f38715a614a76c8d5adcaa48b4115b764c14
              • Instruction ID: 42376cd6d93cd822474fe7ba4c9f270f0b84e940eb06d390718b3cfde4c13126
              • Opcode Fuzzy Hash: 5fcfd42d316fb6b60c2ad2893012f38715a614a76c8d5adcaa48b4115b764c14
              • Instruction Fuzzy Hash: 0C4190B2E01615DFCB19DF69C9809EDBBF1FF88324B11862ED566A7260D735A901CF40
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
              • Instruction ID: 425a820c031fc3e6e66e7a3a258584ab3436cad6d805e9bd713db0e75241015f
              • Opcode Fuzzy Hash: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
              • Instruction Fuzzy Hash: 00312831A08645AFDB299B68CC44F9BBFEAEF18350F044169F915D7352C374D844CBA5
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8bf4e61a167c0dfcc58921a5faf3b024f553cca57bd560151779a71503b705ee
              • Instruction ID: 755b5b3ee19c1ebbbe33b908bfb84eb4a11409ba6ec4e1dd19e0e184fed36068
              • Opcode Fuzzy Hash: 8bf4e61a167c0dfcc58921a5faf3b024f553cca57bd560151779a71503b705ee
              • Instruction Fuzzy Hash: B731B935761716ABD726AF598C41F6B7AA5EB58B54F010028F604AB2D1DBB4DC01C7E0
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: dce6f6d63e3513f398b3d587bc681ebd3213e4fbfd1e041becc4f6152aaebffd
              • Instruction ID: 8b958b38deb88e504e04c028d8bd01f214fe95e6ab2ef95066a6e9764053dc87
              • Opcode Fuzzy Hash: dce6f6d63e3513f398b3d587bc681ebd3213e4fbfd1e041becc4f6152aaebffd
              • Instruction Fuzzy Hash: 0831F632A152828FC725EF1DE994E1677F5FB84320F0A446EEA558B351D730E802CF80
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 839a8db0bc0552c5293031313ccf5452ae76d2111b8de6c1efcf019926f52b0a
              • Instruction ID: 434edecb870fc69cecff60fcf2b955d0e07ae47941a4c28679ff0ce261819f8a
              • Opcode Fuzzy Hash: 839a8db0bc0552c5293031313ccf5452ae76d2111b8de6c1efcf019926f52b0a
              • Instruction Fuzzy Hash: 2A41AE31210B46DFD72ACF68C885BE67BE5AB48354F01842DE66ACB690C774E840CB94
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e65e801920e52efd151b1bcc3703260a96269775eebe591b45252534aa324174
              • Instruction ID: af31bb07759e0fb1d0ecb92e171196ab0ca59ad9bfc08009bbcca1d825f30e32
              • Opcode Fuzzy Hash: e65e801920e52efd151b1bcc3703260a96269775eebe591b45252534aa324174
              • Instruction Fuzzy Hash: 5531CF316243828FDB20EF2CD984A2AB7E5FB84310F05456DFA558B390E730EC06CB91
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2eed4604051d26c65bd82262d8e51e4e8b1bc04491b52713c7aeae72a4e00891
              • Instruction ID: f8bafd53af96e44c955d40c9a99cc21b28ff1ce739870490766730b31ddae4b3
              • Opcode Fuzzy Hash: 2eed4604051d26c65bd82262d8e51e4e8b1bc04491b52713c7aeae72a4e00891
              • Instruction Fuzzy Hash: AD31F5323216839BF3269B5DCD88B29FBD8BF40745F1E00A4AF458B6D1EB78D940C225
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2095dd2e44f504534fc9de4acf4aeb72b2e88e479100fa28e0bfe6e1aaaafb69
              • Instruction ID: 167b809062b140d902a8ce08883747680c3afb9f2d877b25135c30c0a558e182
              • Opcode Fuzzy Hash: 2095dd2e44f504534fc9de4acf4aeb72b2e88e479100fa28e0bfe6e1aaaafb69
              • Instruction Fuzzy Hash: 3231D575A10166EBDB15DF98CC40FAEB7B5FB44740F454169EA00EB244D770ED41CB94
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3fc7962b016b0c0d73196d7587f779239a063b414d77da8ac708c767ab7b6596
              • Instruction ID: c5a46931a4a53f5ff51ee88a0b5f89dc9f82fa3673adec01f530528000a77d4d
              • Opcode Fuzzy Hash: 3fc7962b016b0c0d73196d7587f779239a063b414d77da8ac708c767ab7b6596
              • Instruction Fuzzy Hash: 2B315576A5116EABCF31EF54DC44BDEBBF5AB98310F1500A5E508A7250DB309E91CF90
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ab328d1fe8e8c9b042474ebb133bc68ff2d82b7548c4670312108ec6651263b7
              • Instruction ID: 39f4a0e2b66fae10c1ba1bed1c437948949f5c6c1ae17732b09451f7656a9834
              • Opcode Fuzzy Hash: ab328d1fe8e8c9b042474ebb133bc68ff2d82b7548c4670312108ec6651263b7
              • Instruction Fuzzy Hash: 6031D772E20615EFDB22DFA9C940BAEBBF8FF44750F014925E655D7291E3709E408BA0
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1aa5141acf8c133403903ce10638b35edd0707ac4270f7955e56ab90d0d44030
              • Instruction ID: e1d6658f72f9c5790e240cf7a230dff64b93d7a13479ec022a453ed16b35b35c
              • Opcode Fuzzy Hash: 1aa5141acf8c133403903ce10638b35edd0707ac4270f7955e56ab90d0d44030
              • Instruction Fuzzy Hash: D831F472B60206EFDB129FADC850B6ABBB9EF44314F58006DE601DB342DB70EC018B90
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e455913ce2cc1c51f54ad4c4d2dc8f81650aac00d3c618f64f38a86d504f0ba0
              • Instruction ID: cf8986573ff0c5a4a5b02cd6e92626239a3cd663620cc321233be7fa371d9b04
              • Opcode Fuzzy Hash: e455913ce2cc1c51f54ad4c4d2dc8f81650aac00d3c618f64f38a86d504f0ba0
              • Instruction Fuzzy Hash: 2C31D472F04A12DBC71ADEA88884E6BBBE5AFD8250F06492DFD5597210DB70DC1187E2
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4afb1fe943eaf7268b593b08535644d1bf4a6b62394782d91f6afdf9f1ef0cdf
              • Instruction ID: f33b1b08220d2d60da0110e40bffe467543756274b4a21acce38f6e748475faa
              • Opcode Fuzzy Hash: 4afb1fe943eaf7268b593b08535644d1bf4a6b62394782d91f6afdf9f1ef0cdf
              • Instruction Fuzzy Hash: F731AB71619702CFE328CF1AC844B2AFBE5AF98700F05496DFA849B251D770E844CBA1
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0db01105071e305578d35fd0a84dce3d89a7587bc94cbde32e7e57e396344d18
              • Instruction ID: 18352d16aa6848ed29345201da5153ce87db476f878079a83518bc137a1fdbc2
              • Opcode Fuzzy Hash: 0db01105071e305578d35fd0a84dce3d89a7587bc94cbde32e7e57e396344d18
              • Instruction Fuzzy Hash: 8B312CB2B11B41AFD765CF69DD41B5BBBF8AF18650F04052DA69AC3651E630E900CB60
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c5ffda21221797ae52cdacf4cfd4fe14f46aaf5b9b1153593a4be4468f315fdc
              • Instruction ID: db0647f981960705e5e4cff44747aa3503472e5b10e0992a444c0044382063e1
              • Opcode Fuzzy Hash: c5ffda21221797ae52cdacf4cfd4fe14f46aaf5b9b1153593a4be4468f315fdc
              • Instruction Fuzzy Hash: C631CFB191A302DFCB15EF19C54095ABBF1FF89218F0649AEE5889B391D330D944CF92
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ca0b22aa9fdeb3235bea5f2a9b51dbe22ee6781ae0b1abf404dce2afe4c40243
              • Instruction ID: 49d17c88efb8cc19d12d42c447c03135146ca6d98c963ac38b4f820b8515c784
              • Opcode Fuzzy Hash: ca0b22aa9fdeb3235bea5f2a9b51dbe22ee6781ae0b1abf404dce2afe4c40243
              • Instruction Fuzzy Hash: 5931F631B202869FD725EFB8C981A6EBBF9EB80704F018629D605D3696D730D945CB50
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8cd4161f5b4d08ac4698b36444b06603346f514182f58bb0feca1d395408faf4
              • Instruction ID: 5af39d53f28cd1179dd4e156ea8b4d5adc72d4b847ac20f483e6507514efd66d
              • Opcode Fuzzy Hash: 8cd4161f5b4d08ac4698b36444b06603346f514182f58bb0feca1d395408faf4
              • Instruction Fuzzy Hash: 47213472E5125BAADB159BB98801BAFBBB5AF50740F068439AF55E7340E370D900C7E0
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: dac15864f42eb57ae6ec066e1ef6113265ab40d295cf6b3748a91f1bc4bdc2fa
              • Instruction ID: bfccbc2490b8e30391b61640ed2ec81db528764e37fd1f1edeceadeffdf04a24
              • Opcode Fuzzy Hash: dac15864f42eb57ae6ec066e1ef6113265ab40d295cf6b3748a91f1bc4bdc2fa
              • Instruction Fuzzy Hash: 7B315EB15102168BDB2AAF68CC44BB977B4EF80308F9481ADDA459B342DB34D986CF90
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
              • Instruction ID: f37a30f177d1580872a70a2f2af5add25b5f00642b6aa8bf5c0df4483d665276
              • Opcode Fuzzy Hash: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
              • Instruction Fuzzy Hash: D2212B3A710652B6CF15AB998800ABEBBB4EF50710F40901EFAA587691E734D960C3B0
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 87b8d49851ed944ceb70fc62f797a118ddc5300274ed029d53f7a56dea8d1286
              • Instruction ID: b96b9747d57f863f6213066dd28b837b0c35a2b8f820b6566f0c25dda75a72fa
              • Opcode Fuzzy Hash: 87b8d49851ed944ceb70fc62f797a118ddc5300274ed029d53f7a56dea8d1286
              • Instruction Fuzzy Hash: AE31D431A0252C9BDB39DF18CC41FEEB7B9AB15784F0101A5E655EB290D774AE80CF91
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 889ecffd1a06a090bd79871a4c0fdf01ee42b751b4f666e31dccfc06bb2b9632
              • Instruction ID: da87ce6d4754d6d53dc462c8725de7b499b53341b680951b4c1c9b0225f7ab89
              • Opcode Fuzzy Hash: 889ecffd1a06a090bd79871a4c0fdf01ee42b751b4f666e31dccfc06bb2b9632
              • Instruction Fuzzy Hash: 2E21A031A00789EFCB10DF58C980A9EBBE5FF58358F108469EE199F245D770EA018B90
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fe23ae8189a564315338b710a6bf8ae867e941b6d154bd52b44ca8b1e7c96878
              • Instruction ID: 608d9222e9f25eec3c59ce2928b592eb015afb1c0126d7b29f070bc69322ec40
              • Opcode Fuzzy Hash: fe23ae8189a564315338b710a6bf8ae867e941b6d154bd52b44ca8b1e7c96878
              • Instruction Fuzzy Hash: CC21D772524786ABC722DF18D480F6B77E4FFA8760F014519FE589B645D730D901CBA1
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
              • Instruction ID: 5fcb112a88b6c1414940d1a167e94b8b33c06bf02cb589105c5071a9d2c5e15c
              • Opcode Fuzzy Hash: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
              • Instruction Fuzzy Hash: CF319A31600605EFDB29CF68C984F6ABBB9EF85354F1045A9E612CB280E730EE02CB51
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3f16fbf38a6681b38989d30bb961c8f21db9136edde8f7a04276fc938579e887
              • Instruction ID: 11d6432dbcc4293d905a3dc24983e990bdeda6a27a430cba03bde8998ad94e71
              • Opcode Fuzzy Hash: 3f16fbf38a6681b38989d30bb961c8f21db9136edde8f7a04276fc938579e887
              • Instruction Fuzzy Hash: E9319F75A20206DFCB54DF1CC8849AEB7B5FF88744B16445AED099B391EB71EA40CBA0
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 03eba559a04382b7a7214d7d3832e2958550be7ba9c57fae24d33d5de30545c7
              • Instruction ID: 40cfbeac196041f35c1b080dddc357e5d0876499a8e8288f753117cd91784fc3
              • Opcode Fuzzy Hash: 03eba559a04382b7a7214d7d3832e2958550be7ba9c57fae24d33d5de30545c7
              • Instruction Fuzzy Hash: AC21E17191022AEBCF19DF59C881ABEB7F8FF48704B410069F501EB240D778AD41DBA4
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 48ea3efb66b711eeb2ed0b0387d037078bac13a7777619131bd7b701701c5664
              • Instruction ID: b1a597aca127c8ff98d2ec305dc79836ec7a1cd4027e57d4c191df129086fc4e
              • Opcode Fuzzy Hash: 48ea3efb66b711eeb2ed0b0387d037078bac13a7777619131bd7b701701c5664
              • Instruction Fuzzy Hash: 18218971620656EBD715DB68D840F6AB7A8FF48744F140069FA04DB6A1D738ED40CBA8
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1b01337e513d0613aa0c602cde2342bfce47c6a3e99ee935825fa0ebf391cb7a
              • Instruction ID: 3f8da3d53364150325155ccbaadcf24d6a85435ad70cf980224b9f3edb99a18b
              • Opcode Fuzzy Hash: 1b01337e513d0613aa0c602cde2342bfce47c6a3e99ee935825fa0ebf391cb7a
              • Instruction Fuzzy Hash: E92122729243869FD312EF69C844F6BBBDCEF90244F08445ABE90C7291D730C988D6A6
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a39c3fad9f5aeea18f9648a61b467bf38bde53a79d7faa395c6df8191caf656d
              • Instruction ID: 76fafa120ec15f5c93dc9b9826b03fd47d34230b560ed6644eb6e6297f0eb283
              • Opcode Fuzzy Hash: a39c3fad9f5aeea18f9648a61b467bf38bde53a79d7faa395c6df8191caf656d
              • Instruction Fuzzy Hash: EB210431675682DBE32B576C8C08B283B94AB41B74F2803A5FB619B6E2DB68C801C250
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 923ff34cb3bf33b9cd002eccb9c1d7ca3dae0b9a30501157d8799576044a408a
              • Instruction ID: 3c42264176678b90ff205ef5b9039103b57e5093f3edad5e24afdbbfe9c26479
              • Opcode Fuzzy Hash: 923ff34cb3bf33b9cd002eccb9c1d7ca3dae0b9a30501157d8799576044a408a
              • Instruction Fuzzy Hash: 2121DE352616429FCB29DF29CC01B02B7F5FF18708F14846CA509CBB61E370E842CB94
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 85b4ee81067e7edf1a4fddc1ed0fe468c48ff2685cdcba21aa41a53e7ec385b9
              • Instruction ID: ae58747e8c98b72772a6df8e5946a14b41b664f95dd51af4a2972930c5774bd6
              • Opcode Fuzzy Hash: 85b4ee81067e7edf1a4fddc1ed0fe468c48ff2685cdcba21aa41a53e7ec385b9
              • Instruction Fuzzy Hash: 151129727A0B11BFEB22565DAC41F2BBA99DBD4B60F510028B718DB290EFB0DC018795
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 528b9336eae157781c1e33d472e37a0f29d3c4d04ff42b810790a6db7195c6f3
              • Instruction ID: f1532dcef4718207fc26d92b0e2a0b36d7d9ae555a7d2c0c93a65a73718ee64e
              • Opcode Fuzzy Hash: 528b9336eae157781c1e33d472e37a0f29d3c4d04ff42b810790a6db7195c6f3
              • Instruction Fuzzy Hash: 20212AB1E51209ABCB24DFAAE9849AEFBF9FF98700F10012FE505A7240DB709941CF54
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5cbf44edbda76f4502fdddb46b30f07fa62677dc347fe83d1d029fa4afc5ea58
              • Instruction ID: fec18e3df842fd4d4632ec23aa127bb6279e18a70d63bdf1d8e9d8616624794f
              • Opcode Fuzzy Hash: 5cbf44edbda76f4502fdddb46b30f07fa62677dc347fe83d1d029fa4afc5ea58
              • Instruction Fuzzy Hash: 47218C72A1020AEFDF129F98CC44BAFBBBAEF98310F214819FA14A7251D774D951CB50
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
              • Instruction ID: 1afd1186ad2019262ef6fffd66cb4dc78a823bf4e086a4ed35f94c6a33079433
              • Opcode Fuzzy Hash: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
              • Instruction Fuzzy Hash: 9B112F3361060ABFE722DF48CD41FAABBB8EBA0754F100029F7048B180D675EE80DB64
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2b7ff6b8a42d9773018e601579a5fbac491c1ab3d6d66b87053c0875c7df2509
              • Instruction ID: e449781bced05b8d0da65c5709ba0469c75901ca82e6fab07440a65dcb38f024
              • Opcode Fuzzy Hash: 2b7ff6b8a42d9773018e601579a5fbac491c1ab3d6d66b87053c0875c7df2509
              • Instruction Fuzzy Hash: 9E11BF35B40E119BDB19CFCDC484A26BBE9AF4A714B1980ADFE08DF205D7B2D901C790
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 700b994c149a06d3a2bafb24f87cb9ea5d96fd9e079d56f2785a4d6db1ec69ec
              • Instruction ID: bef126c08794b2e909f48f8dc25b591366b6a1bac3af85ac03e395988d81ae6a
              • Opcode Fuzzy Hash: 700b994c149a06d3a2bafb24f87cb9ea5d96fd9e079d56f2785a4d6db1ec69ec
              • Instruction Fuzzy Hash: 6D214975A40606DFCB18CF98C585AAABBF5FB88318F25416DD105AB311CB71ED06CB90
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 706f206a9fef5cb47e1e29ffdcd5de39a0ee43a3d49a96bc19961299df033a4e
              • Instruction ID: ad3b735e9ff14ef4b8d1854462ea70e02ea518d4031ffc997ff00b1ce08ff0f7
              • Opcode Fuzzy Hash: 706f206a9fef5cb47e1e29ffdcd5de39a0ee43a3d49a96bc19961299df033a4e
              • Instruction Fuzzy Hash: 89219071620A01EFD724DF68C881F6AB7F8FF54250F44882DE5AAC7251DBB1A841CB60
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c1d70fd8698e2e0e8d26e8636ec7eb5a1948b96f49294f0a51e185bd8d33bd84
              • Instruction ID: 2441ac93e29f8d0c5288ee1e2cdd707c7352c706f189203ce607b09b72929dbb
              • Opcode Fuzzy Hash: c1d70fd8698e2e0e8d26e8636ec7eb5a1948b96f49294f0a51e185bd8d33bd84
              • Instruction Fuzzy Hash: 4011E332260A16EFE722CB5DC940F9B77A8EF99750F114029F205DB251DB70EC05C7A0
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 68dd3f03067e08354d43060f872c98ca4c489615315d70138844957b03a34e29
              • Instruction ID: 4d86dae456441b88593ff1a25f84f283b3995819916ff0ecb26bc8e8f1bbbe4d
              • Opcode Fuzzy Hash: 68dd3f03067e08354d43060f872c98ca4c489615315d70138844957b03a34e29
              • Instruction Fuzzy Hash: E3112F333201199FCF1EDB29CD41A6B7256DFD5374B364929D626CB2D1E930D842C790
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f27cd46328faa17d41c5cb19bec14b25072886e1b592c85f372ab48d2efcb2b2
              • Instruction ID: 0cedec25fd6e84b86bc04c2133f755ab8fa38c96d3dae996d679b9934f4a50e8
              • Opcode Fuzzy Hash: f27cd46328faa17d41c5cb19bec14b25072886e1b592c85f372ab48d2efcb2b2
              • Instruction Fuzzy Hash: 5811E376A21206DFCB2DCF59D580A5EBBF4EFA4610B06407DDA059B318E7B0DD01CB90
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4aa21802b203594a0c183a0f29eab8f59a86752156d6c183eb3a1b7e63dba1b2
              • Instruction ID: e37705835efbfc3700f7c397e17a3202d5b511b400cfc73a07395461f20aa39e
              • Opcode Fuzzy Hash: 4aa21802b203594a0c183a0f29eab8f59a86752156d6c183eb3a1b7e63dba1b2
              • Instruction Fuzzy Hash: E0110436A1090AAFDB19CB58C801BADBBF5EF84310F058269E85597340E671ED41CB80
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: be7cdff5b472ac4535dea4ef4a70d93a0a3acfb449cd7ab0a5074af29ebfca6c
              • Instruction ID: 21943a459a607933dab7bf9cdc52d2d1377f3c190264c2d9097786fc23a3986c
              • Opcode Fuzzy Hash: be7cdff5b472ac4535dea4ef4a70d93a0a3acfb449cd7ab0a5074af29ebfca6c
              • Instruction Fuzzy Hash: 3E11E379620602EFE720DF49C844B56BBEAEF41754F168428EA089B1B0D770DC80CB90
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ef8a1697daa8e9940ebbed0d005b695fb3aa91ef46d5073f50e9257ff6cff8c4
              • Instruction ID: a79e83e12f7285eeb75f2c81a6e95a1f62c882b722e83529365aeeb9532fd217
              • Opcode Fuzzy Hash: ef8a1697daa8e9940ebbed0d005b695fb3aa91ef46d5073f50e9257ff6cff8c4
              • Instruction Fuzzy Hash: B101D6766B5646EBE31BA66ED849F2B6B9CEF40758F050065FA018B2D1DA64DC00C2B1
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: bab5c7ce8de5092272054dec748951db60ec681fff99c1c1cfd5e492cdb9db39
              • Instruction ID: 614933b0f01642d29acc991efddafbef017da0b299e45905361a86e524d68b97
              • Opcode Fuzzy Hash: bab5c7ce8de5092272054dec748951db60ec681fff99c1c1cfd5e492cdb9db39
              • Instruction Fuzzy Hash: BF11A036684E45AFDB29CF99D888B567BE5EB85B64F154119F904CBA50C370E840CFA0
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 53b9d4b430d61500f1c9a4933207a4e4c3e493f9db1ef819b595dabfb0c1486b
              • Instruction ID: 0fc28760ac68e6996726cbe4c031ce155c2dd2663ac48cff347ccb4c2aedb180
              • Opcode Fuzzy Hash: 53b9d4b430d61500f1c9a4933207a4e4c3e493f9db1ef819b595dabfb0c1486b
              • Instruction Fuzzy Hash: FE110A326106429FD721AA69D8C0FA6B7A5FFC4750F144419EB8387291EA30E801C790
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4f38470555f7ead1b3a95c043d9915992586c4a3a5053ad63c617b8c8442a5a7
              • Instruction ID: f6c8b4a011a9894ea5e7b7eb4fc02e394bebfc5896e07ff4c38ea2a90e5f595b
              • Opcode Fuzzy Hash: 4f38470555f7ead1b3a95c043d9915992586c4a3a5053ad63c617b8c8442a5a7
              • Instruction Fuzzy Hash: 1911C276A10656AFDB21DF59C980B5EFBF8EF94744F510859DB00A7204D7B4AD01CB50
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9ea4df532fe9db5f6d5eb571e03b35054a427c699fa79c841d110c527d231172
              • Instruction ID: ab519d214efa750f106f00a6a9db3d6b785fab79ec61e7ea766024670acbe45a
              • Opcode Fuzzy Hash: 9ea4df532fe9db5f6d5eb571e03b35054a427c699fa79c841d110c527d231172
              • Instruction Fuzzy Hash: 3601F97161110A9FC726DF18E508F15BBF9FF85318F214669E1058B661C7B0DC82CB90
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3cef38ccb94af525019048e13b43edf7cf1492b2ee9bf366ac8f969377c4ca22
              • Instruction ID: 5932de170a66029ca193e5b4596051f312836d2d98c9ce33d7275c8bd13cb095
              • Opcode Fuzzy Hash: 3cef38ccb94af525019048e13b43edf7cf1492b2ee9bf366ac8f969377c4ca22
              • Instruction Fuzzy Hash: 0011E5722316C39BE727972CDA54B257B94AB80758F1A08A0DF4197AD3F369C882C250
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9e027ce95eb4732775abeceb8693466c215af0eeeb981fbb7873360829093128
              • Instruction ID: 476da2578fb3484f19ccbf31c85a84856a96c10dc6a9a203f8e13b5b244ac13e
              • Opcode Fuzzy Hash: 9e027ce95eb4732775abeceb8693466c215af0eeeb981fbb7873360829093128
              • Instruction Fuzzy Hash: B301C47A610506EFE72ADF58C805B5A7AADEB40B54F068424EA059B1E0D779DD80CB90
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
              • Instruction ID: 317c0d23107b35951540dbb27c8bda02af7e9bf9616a3be2aa6ed349b9d0a3c3
              • Opcode Fuzzy Hash: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
              • Instruction Fuzzy Hash: B401F572505B229BCB39CF5AE840A367BF5FF55B607008A2DFD958B681D735D800CBA0
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 946480d2ac4467f853dd2f1d4b6693b8810f2fad8cbf346cd2d3507849c76646
              • Instruction ID: dce4658fcd7936abe3f96ad352278313991be15f75a444374751a928d3deb248
              • Opcode Fuzzy Hash: 946480d2ac4467f853dd2f1d4b6693b8810f2fad8cbf346cd2d3507849c76646
              • Instruction Fuzzy Hash: BA014E32561A429FC332EF1CD8C0E96B7A8EB813B4B154215E76657197D730DC01C7C0
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 21b0f2faf296baa6aa1e2b25af7679a1c477c195a568b97330a9128cd179e728
              • Instruction ID: 2563107d82c5e30a72dbee578ea9ccc8c04aff1b2474e47ee4ed07e41d2a4e41
              • Opcode Fuzzy Hash: 21b0f2faf296baa6aa1e2b25af7679a1c477c195a568b97330a9128cd179e728
              • Instruction Fuzzy Hash: A111A132251645EFDB25EF59CD90F16BBB8FF54B84F100065EE059B651C735ED01CA90
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 546b34c7bd7b97160e08bb20725ef14968a8cb25a262f5019c83578dfdcafcdf
              • Instruction ID: b8f84d266ca85b05a067605bbf6e3818e76661fc830091c75decf01c05f5c615
              • Opcode Fuzzy Hash: 546b34c7bd7b97160e08bb20725ef14968a8cb25a262f5019c83578dfdcafcdf
              • Instruction Fuzzy Hash: B2115A71551229ABDB29EB64CC52FEDB2B4BB18710F504195A318A61E0DB719E81CF84
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f3b4b366eb3517b7d85bbb7c727ef0112f42bb40f185c1d4f16d6d9aebaca49d
              • Instruction ID: 5a0e840c381daa5c135388029879a01e5cdd0fbee2c37eff834d9d638148bd82
              • Opcode Fuzzy Hash: f3b4b366eb3517b7d85bbb7c727ef0112f42bb40f185c1d4f16d6d9aebaca49d
              • Instruction Fuzzy Hash: 98111772900019ABCB15DB94CC84DEFBBBDEF58258F044166E906E7211EA34EA55CBA0
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
              • Instruction ID: 0eddd5d83b9db747b6ff59e7fee83bb922f0815c68eb92cf66f11eb9ece06e58
              • Opcode Fuzzy Hash: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
              • Instruction Fuzzy Hash: 42014C726106018BDF1D9E9DD8D4BA67BABBFC4700F5645A5EE018F286DB71CC81C391
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 14e8746bf4db12a5f9934fe431bc1c4420ac8030217b1c2724060617c0044cff
              • Instruction ID: 04b926307b410c20fbc9c5bfcc32f1f917f174020cfadd3b088023ef6569090f
              • Opcode Fuzzy Hash: 14e8746bf4db12a5f9934fe431bc1c4420ac8030217b1c2724060617c0044cff
              • Instruction Fuzzy Hash: 9E11C4326545469FE711CF58E800BA6FBB9FB5A314F088159E949CB316D732EC81DBA0
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ee218152f49da24514f0d7bed93172db889423501e706138c7da10977f91c65d
              • Instruction ID: 9aa65f285e1225418cbff1b87732576e55b64629d6db906e454481f51bedfc33
              • Opcode Fuzzy Hash: ee218152f49da24514f0d7bed93172db889423501e706138c7da10977f91c65d
              • Instruction Fuzzy Hash: A61118B1E10219ABCB04DFA9D541AAEBBF8FF58350F10406AE905E7351D674EA01CBA4
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 05c21e176f35929fab24ec554425add112857fee524882f38bce36384e144383
              • Instruction ID: 4232a7151d8e1f447b81301cc77b4980a9785bb2518d943adef7669e7801dd9a
              • Opcode Fuzzy Hash: 05c21e176f35929fab24ec554425add112857fee524882f38bce36384e144383
              • Instruction Fuzzy Hash: 8201F1311622129BCB36BB19C40497AFBA9FF51A54B0A442EE3150B291CB30EC41CB91
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
              • Instruction ID: 3485edf5d0279a5531bcee2de646404a861b7584a9cfb58b2aa6fd8fc622203d
              • Opcode Fuzzy Hash: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
              • Instruction Fuzzy Hash: 5A01F57211070A9FEB26A6A9D840BB777E9FFD5650F45481DA6468B580DB70F402C790
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2682cf6099ec850bae5a1d1f5ce82c7334161648845da63172ccef610bd73e72
              • Instruction ID: fd91a379d150219d79491428bd3e94b9452b235360aa559108280acbd780dadd
              • Opcode Fuzzy Hash: 2682cf6099ec850bae5a1d1f5ce82c7334161648845da63172ccef610bd73e72
              • Instruction Fuzzy Hash: B5116D35A1125DFFCB05EF64C851FAE7BB5EB44354F104059EA119B290DA35AE11CB90
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c40066d835316f8eeea07577c9ba5c3c99b4c395d5749465694a72ac76837867
              • Instruction ID: 678b20506f091ab30c4bb2f351e52aa30f7c96c1e0c187b490fff20ca9939bd3
              • Opcode Fuzzy Hash: c40066d835316f8eeea07577c9ba5c3c99b4c395d5749465694a72ac76837867
              • Instruction Fuzzy Hash: 1601F771221502BFC715BB39CD84E53B7ACFF54698705062AB705C3561DB74EC01CAE0
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 995c9b83adf2c4ea96315b6570ecd73e4cf6eb4d7c4f001f7816a32578862676
              • Instruction ID: 15669caa1b275e05b53cd273eab41edc74bd65bd4e23c8924e8829c22ab58c9d
              • Opcode Fuzzy Hash: 995c9b83adf2c4ea96315b6570ecd73e4cf6eb4d7c4f001f7816a32578862676
              • Instruction Fuzzy Hash: A201FC322346129FD324EF6DD849D6BBBA8FF98664F214129E959871C0E7309905C7D1
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e61adaa1b02847673e672f8c08e915856655a244754034e0c92a5e3b7cb0afd6
              • Instruction ID: 9cc629698023bffa5d3f88d9454cc5a39228954724cd4a4ad908dbdd2a0eb8d2
              • Opcode Fuzzy Hash: e61adaa1b02847673e672f8c08e915856655a244754034e0c92a5e3b7cb0afd6
              • Instruction Fuzzy Hash: 4311A974A1120DEBCB04EFA8C844EAE7BB9FB48310F004059FD4197380DA34EA61CB90
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5dde80dcbbdf95bae6e3cccccb067c121559f73d7a404d849e10e4a954a3c27f
              • Instruction ID: 986f9e117ee69f156db4e516bcfe1389adfab7989df6234823ffa75538e9069c
              • Opcode Fuzzy Hash: 5dde80dcbbdf95bae6e3cccccb067c121559f73d7a404d849e10e4a954a3c27f
              • Instruction Fuzzy Hash: 90117CB16153059FC700DF69D44195BBBE8EF98310F00451EFA98D7390D630E900CB92
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: afd2bc15ae471e87ec0207b042aba8aa47aae3ce4ee156e694c2c20b33db7d34
              • Instruction ID: ed3d4e2d5b9efd4936444a90b8ed414fedb3105e368e3ac3a12e0607ea15e94d
              • Opcode Fuzzy Hash: afd2bc15ae471e87ec0207b042aba8aa47aae3ce4ee156e694c2c20b33db7d34
              • Instruction Fuzzy Hash: 67115A716143059FC300DF69D44195EBBE8AF99350F00451EF998D7390E630E900CBA2
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4be238ecb871e70af7da4c9819feb513cc5cd9ee9a4f29187abed574232cbb68
              • Instruction ID: bef9341f630a80b777b59728ef93769053c4c0b9b08c8714a3bbe7bdd27895e3
              • Opcode Fuzzy Hash: 4be238ecb871e70af7da4c9819feb513cc5cd9ee9a4f29187abed574232cbb68
              • Instruction Fuzzy Hash: 810128332206429FD721AA59C8C0FE6B7EAFBC1350F044519E743CB651DAB0F840C750
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
              • Instruction ID: fda873056e49cb9e0cc4a84d4525330b3a426ed72988ce830cc1d41931a26b00
              • Opcode Fuzzy Hash: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
              • Instruction Fuzzy Hash: 2001DFB23115809FE72A871DC908F267BECEF85754F0A00A5FA05CB6A1C778DC80C226
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 11cf47f8f3dca00ba3342c222b3fbfa15f6a92a099fabf0aca9a4442af8a4fef
              • Instruction ID: 344654bd461f632769b267d4029f7015df719797e9d713e9e420e09d61ae0a82
              • Opcode Fuzzy Hash: 11cf47f8f3dca00ba3342c222b3fbfa15f6a92a099fabf0aca9a4442af8a4fef
              • Instruction Fuzzy Hash: 8401A272B10605EBD71CEB69ED059BFBBB9FF80620F164029D902A7684EF20ED01C791
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: 2e5117dc72df6f623cd036476dd9dee2d017e91dd4a7057a70571a76759e54a4
              • Instruction ID: e4b6d6a24b8ebf867148e88418ead6b6a42dc42b46ea900de91b79620f23f0bd
              • Opcode Fuzzy Hash: 2e5117dc72df6f623cd036476dd9dee2d017e91dd4a7057a70571a76759e54a4
              • Instruction Fuzzy Hash: 5E01DFB1295601AFE335AB19E800B06BAA8AF54B50F02042EE30A8B390D7B0D8418B54
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2855e0db36af6921f8d288139556509b04272ffee63e85cc5057ea9c702e3b46
              • Instruction ID: 3ef1859fd17ebe1bcd0151e9d45c4c0606f875243a7eb6c6227ab4415d492660
              • Opcode Fuzzy Hash: 2855e0db36af6921f8d288139556509b04272ffee63e85cc5057ea9c702e3b46
              • Instruction Fuzzy Hash: 63F0F932641A11B7C7399B9A8D54F47BEEDEF84A90F11402DA60597600D730DD01C6A0
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
              • Instruction ID: 52af4b4a87c1e3c48be4b3a241336b2043b800d3d1d2c8f2b63cd85cc95a8ad4
              • Opcode Fuzzy Hash: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
              • Instruction Fuzzy Hash: 94F0C2F2A00625ABD325CF4DDC40E67FBEADBD1A80F048268E615C7221EA31ED04CB90
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
              • Instruction ID: 83da4ce3e8653aa730e94c3f5c005c857b7096f777c779c1603663c498f309da
              • Opcode Fuzzy Hash: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
              • Instruction Fuzzy Hash: D8F0FC7325C633ABD73E16594840B6BEA958FE1A64F1A043DE2059B244CF609D02D6D1
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 637205a89cd25bf1fdfeff13ed7763b01917633c8f8577723fa30addbe5eee54
              • Instruction ID: 751e77c71c4b13ce91e050f050718f52a7f45390632bb101a87b5d9f01253a20
              • Opcode Fuzzy Hash: 637205a89cd25bf1fdfeff13ed7763b01917633c8f8577723fa30addbe5eee54
              • Instruction Fuzzy Hash: FC017171E20209ABCB04DFA9D4519AEB7F8FF58704F10402AE910E7350D6749A008BA0
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: aa21361e4327e80e319cf60899daf83cda9da10de4d3a414d84dd0c18d1a767a
              • Instruction ID: 85083f480b4bca93e71c7017bc82a90b886d48e93052516a375375dda73f9429
              • Opcode Fuzzy Hash: aa21361e4327e80e319cf60899daf83cda9da10de4d3a414d84dd0c18d1a767a
              • Instruction Fuzzy Hash: F1017171E1021AABDB04DFA9D4519AEB7F8EF58344F10401AF914E7350D6749A00CBA0
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9fbb6d5f28e5b69b6af41a0aaeaae58d912cb428e14a52a63662176fd56a3577
              • Instruction ID: 30252a763ccbac9c8e2af41517069d29ce600ef17160d612b3b1bd0c5a1e1560
              • Opcode Fuzzy Hash: 9fbb6d5f28e5b69b6af41a0aaeaae58d912cb428e14a52a63662176fd56a3577
              • Instruction Fuzzy Hash: C8017171E11249ABCB04DFA9D4419AEBBF8EF58704F50401AEA10E7390D674DA008BA0
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6225b3f56bb7e4a8823ac3bf287c1186c08f5b75335344108ff231fc305a603f
              • Instruction ID: 47314a449cc0dd29ce96ea947df2ea4ba5a5fe32b4901ed0f270c60279a33cf1
              • Opcode Fuzzy Hash: 6225b3f56bb7e4a8823ac3bf287c1186c08f5b75335344108ff231fc305a603f
              • Instruction Fuzzy Hash: 8A01F4362606869BD327DB1EC845F59BFD8FF51754F0840A5FF448B6A1D7B8C810C250
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0a83c57e8e72d729c10ad4021b0e440b3260ec1b386958128f8a4a013860ce73
              • Instruction ID: 1d641b0d5caff6a3c0c424186b8d539813ea9d978ad9ad7e6a4c78c909ffce45
              • Opcode Fuzzy Hash: 0a83c57e8e72d729c10ad4021b0e440b3260ec1b386958128f8a4a013860ce73
              • Instruction Fuzzy Hash: 3B018F71E10259AFDB04DFA9D445AEEBBF8FF58314F14405AE500AB280D774EA01CBA4
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: dbb06fbea8421d8b96890fd2b120b20d820a8046168cc589f8d54c87f08ef009
              • Instruction ID: 5e0d7805f06f4e27bee5b10aab7ae59c4b9b12b4f0776f5c658800edfd2971ef
              • Opcode Fuzzy Hash: dbb06fbea8421d8b96890fd2b120b20d820a8046168cc589f8d54c87f08ef009
              • Instruction Fuzzy Hash: 51F01D7221001EBFEF029F95DD80DBF7B7EFB59298B114125FA11A2160D631DE21ABA0
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3a0ef260ee0f474528bb30a4b32fc1a47c6aa88fa2379a04a8cb4c6e299c7f29
              • Instruction ID: 4dd40d48702bcbaad0efcdea0120bc49d31c98fa58d50b379a596d32c18fd1f9
              • Opcode Fuzzy Hash: 3a0ef260ee0f474528bb30a4b32fc1a47c6aa88fa2379a04a8cb4c6e299c7f29
              • Instruction Fuzzy Hash: A4019A3652111AABCF129F84EC44EDE7F6AFB4C754F058101FE1866260C332D9B0EB81
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4aab7ee2779aa6803312724ae27a7baf17b5c74c7242e6b3e01976ee7b810dfc
              • Instruction ID: 0e211f17f38ebe585320296c929b913a6cac810de2a63aecdb9ee32337625205
              • Opcode Fuzzy Hash: 4aab7ee2779aa6803312724ae27a7baf17b5c74c7242e6b3e01976ee7b810dfc
              • Instruction Fuzzy Hash: 7CF02471204261ABF71C96298D42F72329AE7D0650F26842EEB058B2C1EB70DC01C3E5
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fa03c7dc01afe6a8ea7f7920926665b44233cc21d565e49fde517c59f936972b
              • Instruction ID: 917175f1ed1bd7f0f48707b0b4e213141096d1f9225454fd63bc47c2c7037d7a
              • Opcode Fuzzy Hash: fa03c7dc01afe6a8ea7f7920926665b44233cc21d565e49fde517c59f936972b
              • Instruction Fuzzy Hash: E20186706316C2ABE322E72CDD49B2977E8BB50B48F540164BB018B5EAE7A8D441C210
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
              • Instruction ID: a9b22b9c1575da2a27b2f57090d41937202e5d88e1b19604f716134b4148f3ee
              • Opcode Fuzzy Hash: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
              • Instruction Fuzzy Hash: AFF0E935363D9357FB76BB2E9410B3EBA959FA0A00B25062C9711CB6C0DF60D9408780
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6168c74df7881035f69970a17cdbc8bbd68c52d06f01b9a11dec5043249d3eba
              • Instruction ID: 2e72f66214a7cd72ee534ab0bc3a9478d8350d805b26ba0e48281e5f923c496f
              • Opcode Fuzzy Hash: 6168c74df7881035f69970a17cdbc8bbd68c52d06f01b9a11dec5043249d3eba
              • Instruction Fuzzy Hash: 18F05E367316139BE721DA4ECC80F16B7ACAFD5A60F1B0069A7149B2B0C760EC82C7D0
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6b67fcb2f8232a94d61d3a7414df92cee02384c0969be97d014caddc4cafd774
              • Instruction ID: 2095a83dfd801642f6788ec4f50d30a541491f700f775370716c99cf2a82376a
              • Opcode Fuzzy Hash: 6b67fcb2f8232a94d61d3a7414df92cee02384c0969be97d014caddc4cafd774
              • Instruction Fuzzy Hash: 55F081706253449FC314EF28C445A1EB7E4EF98714F40465AB994DB390E634E900C796
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4cdcb84ab97496671339d5fdb647af6bc44589d2c26ee95e7ea7cdc637936955
              • Instruction ID: 4a66748a96675d2ac7bd104f484502052b906792d9982537c0c07573b30a5a32
              • Opcode Fuzzy Hash: 4cdcb84ab97496671339d5fdb647af6bc44589d2c26ee95e7ea7cdc637936955
              • Instruction Fuzzy Hash: 15F02472620204EFE314DF22CC01F46B6E9EFAC344F158078AA44C7164FBB0DD40C658
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a147ef4c894cf4cba66dda90134d98f65714a1dc63eaf4ed35ca125b9647f62f
              • Instruction ID: 100b58a025eb50216de7ada550eae75908eb9432931b998ae9c658f3ffa90eb0
              • Opcode Fuzzy Hash: a147ef4c894cf4cba66dda90134d98f65714a1dc63eaf4ed35ca125b9647f62f
              • Instruction Fuzzy Hash: 0DF06270A11249EFCB04EF69D515EAEB7B4FF18304F408059F955EB385DA78EA01CB64
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 24b0a786b21bc856889848bd034db946181d26c6cae170813739fc165c1424a5
              • Instruction ID: 5b8ab098b9d2ceb9076c22b384a2bad4b39715695dbb95c75aae2e55f4bafa88
              • Opcode Fuzzy Hash: 24b0a786b21bc856889848bd034db946181d26c6cae170813739fc165c1424a5
              • Instruction Fuzzy Hash: 36F0BE31916EE19FE73EDBECC09CF61BBD49B00664F0A896AD589C7D22C724D880C651
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1b0e42cd04fd97746a4843fe62123a10a4c8d7ebdcdd35d50e44a6f576091312
              • Instruction ID: 94d1d81024414e595df399c6066622d2f14580eee93386e7037f8b71df3ecc02
              • Opcode Fuzzy Hash: 1b0e42cd04fd97746a4843fe62123a10a4c8d7ebdcdd35d50e44a6f576091312
              • Instruction Fuzzy Hash: E7F05C67C377C24BCF325B3CF8943E13F54A741214F491045D5A157205C574B483C728
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 12a3c64beecf022c4585984c815da47e73d71ba376a7ea1c477c81d439a5da94
              • Instruction ID: a0107e606bc761c871a65128e738dd75d857b1d15123b58372248060d01fbd08
              • Opcode Fuzzy Hash: 12a3c64beecf022c4585984c815da47e73d71ba376a7ea1c477c81d439a5da94
              • Instruction Fuzzy Hash: 3EF0E9799B15D29FD322D71CC184B5677D49BE07A4F09AC25D61A87616C360E850C650
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6c7572fa5744a55e43c142e8942155ae64e2404789e34097860efd8d5a2ca0e7
              • Instruction ID: 14ba5e92894577ced1f5a8e31ec42741fa22fe3f20139a63966670db666c1bbd
              • Opcode Fuzzy Hash: 6c7572fa5744a55e43c142e8942155ae64e2404789e34097860efd8d5a2ca0e7
              • Instruction Fuzzy Hash: 35E0D8723106117BE7219E598CC0F6B7B6EDFD2B14F04007DF6045F252CAE6DD1982A4
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2f21787fc4cf88bc2024fb188b518997cea13084236808dfde9be923dffdf6d3
              • Instruction ID: ace220f62880ca3021feeac75c9f42d99a07e8b13e73eb82690eda5afcf4fd38
              • Opcode Fuzzy Hash: 2f21787fc4cf88bc2024fb188b518997cea13084236808dfde9be923dffdf6d3
              • Instruction Fuzzy Hash: AFF01C721246059FF7228F09D944B53BBB9FB15364F45C029E6099B561D379EC40CBA4
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 09d204908d37cdfbcfc5d4a721560e7c3d6986de64c378e18d154b12347e5c6c
              • Instruction ID: 39b8b0f3aeb5b92633d37ef97130d658ef3eca8e55a88e5d98cab53a9f2d7ed8
              • Opcode Fuzzy Hash: 09d204908d37cdfbcfc5d4a721560e7c3d6986de64c378e18d154b12347e5c6c
              • Instruction Fuzzy Hash: 40F0E579714B41DBDB1ECF59C050AA97BE4FB55360B010054F9828B341E775E982CB51
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f1b670d1cf9650df618e53f56da6216e466ca8c332a8d3f17e7fbf4f9511b07c
              • Instruction ID: c0f19a76f3d73f60fa98b3bba34c7a2040c2a4d509d158f7c4cee7dc97fde86d
              • Opcode Fuzzy Hash: f1b670d1cf9650df618e53f56da6216e466ca8c332a8d3f17e7fbf4f9511b07c
              • Instruction Fuzzy Hash: 8CE09B332641C59BD321BA598811B6676D597E47A0F170429E20887154DB70EC40C798
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 68f4538a6b2ab1e0a3ec19d51fd696d96c1d542f8e07163a8065f08897dc665a
              • Instruction ID: fd9afa6f05cf185bac87e9d0e7046471a0e46580db1b1c9b9381438b7ec81bfb
              • Opcode Fuzzy Hash: 68f4538a6b2ab1e0a3ec19d51fd696d96c1d542f8e07163a8065f08897dc665a
              • Instruction Fuzzy Hash: A3F0E531E365D28FE772E72CE2C0BD177E0AB107B0F1A0554D60687913C320DC41C650
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9c57e87189bc66aa7caf2535f5315d36853ca328742cb6eaba8c93c68780cd6a
              • Instruction ID: 0ee3fad152eed832755884cbe29c01646571b89f0f8c0457c02feafded55d7b1
              • Opcode Fuzzy Hash: 9c57e87189bc66aa7caf2535f5315d36853ca328742cb6eaba8c93c68780cd6a
              • Instruction Fuzzy Hash: FDE0DF32A41120BBEB25B7998D01F9ABEADDBA0FA0F050054B704E70D0E630DE00C6D0
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c6a5ad91a7d0f1a4d9806dabaf8f22ecb250b1deeb68cfbfcde1a852261f70b4
              • Instruction ID: 43c4946f3a6375f35338b441deb24f2e967b1dde8fe762dc3bc078287ab1c499
              • Opcode Fuzzy Hash: c6a5ad91a7d0f1a4d9806dabaf8f22ecb250b1deeb68cfbfcde1a852261f70b4
              • Instruction Fuzzy Hash: F8E09B316503518FCB268A1DD181AE3B7F8DF957A0F158479EE0547612C271F952C6D4
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: cacb54f9456e31dad6017f19d1e2d90dde8488d0896a618f05e6dbce15c020b5
              • Instruction ID: 8c1b6f8a92518ceb7e0d2749baf132b416a275d0dda3baecef0e5730814314c1
              • Opcode Fuzzy Hash: cacb54f9456e31dad6017f19d1e2d90dde8488d0896a618f05e6dbce15c020b5
              • Instruction Fuzzy Hash: C0E02232000950ABC325BF29DC05F9A77DAEB64364F010119F11557190CB30A800C7C4
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1c3962ef014767a9d047a1ce435ecdb8fc5cd5a05dfca32f291fec24eb47eca0
              • Instruction ID: 39e910ec88e2b1c6ca41f074bd9aca1c94c6d49440eea97dc8e0c34e8c040867
              • Opcode Fuzzy Hash: 1c3962ef014767a9d047a1ce435ecdb8fc5cd5a05dfca32f291fec24eb47eca0
              • Instruction Fuzzy Hash: 1BE01231030752EFEB366F2ED958B667AE1FF50711F158C2DE296124B0C77598D1CA40
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d217a6aac874400d2fdd0dd0cc4ad7a97c57c110d53f39d941a96e3fabb04b1b
              • Instruction ID: a3894844d26c658900697041ca18cbb19d4b296dbbf140860eda1958e8dc9fe1
              • Opcode Fuzzy Hash: d217a6aac874400d2fdd0dd0cc4ad7a97c57c110d53f39d941a96e3fabb04b1b
              • Instruction Fuzzy Hash: CAE0C9343103568FE715DF19C040B627BBABFD5610F28C068A9888F345EB32E882CB40
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 57d200e88d305fd16b330218d650cf977f9beda5bd1689342be5c14fa55f046c
              • Instruction ID: 0e7a2b3dcf840836bb2f3cac55253ad3e2fcb12f266ac2860a051fd1547d72ca
              • Opcode Fuzzy Hash: 57d200e88d305fd16b330218d650cf977f9beda5bd1689342be5c14fa55f046c
              • Instruction Fuzzy Hash: D8D02B334E10316ECB77F918BC08FE33ADD9B70260F014860F208D2015D554CCD186C4
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
              • Instruction ID: 7645e5ccd29d4de9af666af2c0d1587c4cac0da7ddd8f5dee5af439a43b98adf
              • Opcode Fuzzy Hash: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
              • Instruction Fuzzy Hash: A5E0C231120A21EFDB3A2F1DDC00F6577B5FFA4B10F12482AE181064A48771AC82CB45
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 610c6324be0e161b20810d42cddfac6ac630726a14784557cbee7439423488b5
              • Instruction ID: fd7d230fe4c4a41b1a8c685a248529ebd8e386f8d2b4ec800d936e4203f78621
              • Opcode Fuzzy Hash: 610c6324be0e161b20810d42cddfac6ac630726a14784557cbee7439423488b5
              • Instruction Fuzzy Hash: E6E08C321008506BC615FA9DED10F5A739EEBA9664F010225B15097694CB24AC41C794
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4861f5a381a69e507ddb33788bd9690c3cd67957beffc440e81982ecee0e9c4e
              • Instruction ID: 5cec15b22d8c44747b6f6a472d8d56ded5f3c992e89bbe050ac661fb9f057b41
              • Opcode Fuzzy Hash: 4861f5a381a69e507ddb33788bd9690c3cd67957beffc440e81982ecee0e9c4e
              • Instruction Fuzzy Hash: C4E08C33121A188BC728EE18D562B72B7E8EF55720F09463EA62387784C634E944CB98
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2a1cd49be4a36f16e465d6e8719326e712c3afc978f3fe3bf45b66f7a6b88852
              • Instruction ID: c6b54e2a277b68b8aad27738295b6a40d788f561370e6c909e39057beac28b66
              • Opcode Fuzzy Hash: 2a1cd49be4a36f16e465d6e8719326e712c3afc978f3fe3bf45b66f7a6b88852
              • Instruction Fuzzy Hash: 6BD05E36521A50AFC7329F1BEA00D13BBF9FBC4A10706062FA64583920C770A806CBA0
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7eba0efce7d9c3098aed64107f138979cd55621edccfcfde5a0f983e140fadca
              • Instruction ID: 935449f1e9caad8ea16309071292f75babd3273a4492e83d801e9b62e8136d31
              • Opcode Fuzzy Hash: 7eba0efce7d9c3098aed64107f138979cd55621edccfcfde5a0f983e140fadca
              • Instruction Fuzzy Hash: 0BD0A932224621ABDB72AA1CFC00FC333E8BB88764F06045AB118C7050C360AC82CA84
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6e9bfb4306c29fdb1c5fce9039323a2740af754b7679fb8de59faa530781556d
              • Instruction ID: 5960512df7ea11e5da6e443df8dfdae1990b3aaa6c6a421a64869d07d7a7759c
              • Opcode Fuzzy Hash: 6e9bfb4306c29fdb1c5fce9039323a2740af754b7679fb8de59faa530781556d
              • Instruction Fuzzy Hash: F8E0EC359606859BDF56DF99C684F5AFBF5BB94B40F160058A6085B660C734E901CB40
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
              • Instruction ID: b2838451153d26b68afca89d21887a9d56a31d410a4ea8effffb3b991482c056
              • Opcode Fuzzy Hash: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
              • Instruction Fuzzy Hash: 51D0123332607197DF2D96657914F676919AF81A94F1B006D750A93944C6158C43D6E0
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 950ff3e2fa24c389401d46e2ae40292d2d63fe10973766e9e1870c80e88d3a0a
              • Instruction ID: 95f21e09026bbe81e19b5dbaeb2ea70adc2ef7c47b61a04219c8c08798dc2e4f
              • Opcode Fuzzy Hash: 950ff3e2fa24c389401d46e2ae40292d2d63fe10973766e9e1870c80e88d3a0a
              • Instruction Fuzzy Hash: 74D022370E010DBBCB119F62CC01F903BA8E760BA0F004020B604870A0C63AE850C580
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a056497406236a95ebe52468d9dbfa5d5b8de618ac20220a0c174a240ce4237d
              • Instruction ID: 58af618a0c96b65ce7bb26013d81cc1d6ce2a2b3c540f08b9bd5b2329ff82195
              • Opcode Fuzzy Hash: a056497406236a95ebe52468d9dbfa5d5b8de618ac20220a0c174a240ce4237d
              • Instruction Fuzzy Hash: ACD05E355B50028BDF1BCF09C550A3A3AB0EB20640B40006CEB4061424D368D811C640
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a4bbd7c5c996c6314633515492723e329d7ccf5f4dcb798370ffde6045762c53
              • Instruction ID: 548b27717eec74fcd3463a6ae806e618d0f671f7e40bc122addd6fd4f3750fcb
              • Opcode Fuzzy Hash: a4bbd7c5c996c6314633515492723e329d7ccf5f4dcb798370ffde6045762c53
              • Instruction Fuzzy Hash: D5C08033150644AFC715DF95CD01F0177A9F798B40F010021F30447570C631FC11D644
              Memory Dump Source
              • Source File: 00000004.00000002.2227875031.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_400000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 07bcd9975a20d5b5212067cf8e08d1c6910c773f40d55ca02a99d03a03bbedd3
              • Instruction ID: e6a1fcf6a868967ace345d9f12a80fe9a541f047b4fc28353f99e9188280b30d
              • Opcode Fuzzy Hash: 07bcd9975a20d5b5212067cf8e08d1c6910c773f40d55ca02a99d03a03bbedd3
              • Instruction Fuzzy Hash: BEA01213E470084050300C683840078F334D1C3035D0877A7DD0C735500443C41000CD
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
              • Instruction ID: c53cfef28ee8ea9daf8b7dd80f788b23ad4196fb03e73626d496c9ab14cff46e
              • Opcode Fuzzy Hash: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
              • Instruction Fuzzy Hash: 4BD01236110248EFCB02DF41C890EAA772AFBD8750F108019FD1907651CA31ED62DA50
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8541d5aa43a0a658d79fe6471d8132b1696e53b2ec5469e0c5791f15c56add93
              • Instruction ID: 5488f43e327ccd2c3164f057721b6414de580d31bb45be12fe393f3ee30863c4
              • Opcode Fuzzy Hash: 8541d5aa43a0a658d79fe6471d8132b1696e53b2ec5469e0c5791f15c56add93
              • Instruction Fuzzy Hash: DDC04C757215428FCF15DB19D294F4977E4F744754F150890E905CB721E724E805CA10
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: ___swprintf_l
              • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
              • API String ID: 48624451-2108815105
              • Opcode ID: 384b6c2e69446a6aebbac510c708312de538bf43d7b6198b917961ec82b616dc
              • Instruction ID: 441c4da549bc2efa7c4823e1754f6198e3a0e6455cd7d5a356ac401a31df0fac
              • Opcode Fuzzy Hash: 384b6c2e69446a6aebbac510c708312de538bf43d7b6198b917961ec82b616dc
              • Instruction Fuzzy Hash: 2451F4B2B20127BFCB25DFAC89C197EFBB8BB482407548229F5A5D7641D375DE0087A1
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: ___swprintf_l
              • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
              • API String ID: 48624451-2108815105
              • Opcode ID: e06cda1a7e01bad4945718a2e39b6c5a726edcd46c92fd916230b2e7d18690ac
              • Instruction ID: ed698deb2e0b7a56a463486b76366eb20d1fa665e36c50e30c3aafec6d6a2e72
              • Opcode Fuzzy Hash: e06cda1a7e01bad4945718a2e39b6c5a726edcd46c92fd916230b2e7d18690ac
              • Instruction Fuzzy Hash: 4B5106B5A20646FFCF38DF9DD89097FBBF8EB44200B048459E596D7682E6B4DA008760
              Strings
              • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 01254725
              • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 01254742
              • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 01254655
              • ExecuteOptions, xrefs: 012546A0
              • Execute=1, xrefs: 01254713
              • CLIENT(ntdll): Processing section info %ws..., xrefs: 01254787
              • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 012546FC
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
              • API String ID: 0-484625025
              • Opcode ID: 781c3c8c7eeb299b6b23f58a4c07c4faa3747e95e4a9260a66a71f4e6d670331
              • Instruction ID: 39c7dd7991a4bc7a1ac68de33d4a641689aace9e1452ff111607ed4689fafd45
              • Opcode Fuzzy Hash: 781c3c8c7eeb299b6b23f58a4c07c4faa3747e95e4a9260a66a71f4e6d670331
              • Instruction Fuzzy Hash: 37515C3166025ABEEF14EBA9EC95FBD77ECEF64700F0404ADDA05A7181E7709A418F50
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2a48bdd4d8ea14c469ad441b94cf96c101b09c67394ceba66eb56f2a3b9e53c1
              • Instruction ID: 508f2be3b0f60fb6dbbcb90bbe5d512dada8968ebbca460b2a1f689014b58605
              • Opcode Fuzzy Hash: 2a48bdd4d8ea14c469ad441b94cf96c101b09c67394ceba66eb56f2a3b9e53c1
              • Instruction Fuzzy Hash: CE021471528342AFD705CF18C494AAFBBE5EFC8740F048A2DFA895B264DB31E945CB52
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: __aulldvrm
              • String ID: +$-$0$0
              • API String ID: 1302938615-699404926
              • Opcode ID: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
              • Instruction ID: 7074b342fa88e27805d337619a881b1b49c21c74d304ec1448b022112c956570
              • Opcode Fuzzy Hash: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
              • Instruction Fuzzy Hash: D781E431E3526ABEEF29CE6CC8917FEBBB1AF45320F184119DA61A72D1C7748840CB51
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: ___swprintf_l
              • String ID: %%%u$[$]:%u
              • API String ID: 48624451-2819853543
              • Opcode ID: 5fdf61293a3b7116f91026464dbd1d3b5520284bf4dd73342e24bb8505bc3bfc
              • Instruction ID: e5bc3456887895a2c069ade97524a973e0e28cc07b04612f38ef4f30e6993ce2
              • Opcode Fuzzy Hash: 5fdf61293a3b7116f91026464dbd1d3b5520284bf4dd73342e24bb8505bc3bfc
              • Instruction Fuzzy Hash: 1D2153BAA2011AABDB10DF6DD840ABEBBE8AF54654F040116EA05E3201E730D9118BA1
              Strings
              • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 012502BD
              • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 012502E7
              • RTL: Re-Waiting, xrefs: 0125031E
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
              • API String ID: 0-2474120054
              • Opcode ID: 08143a1026032b8c70ea413cf620a297200a47accafa3aa30c34bce4ec65beb9
              • Instruction ID: 004cc09b58b0bc3fa5be44567cbee1dfcfb113b9012fcc3e0e5d746d6c199476
              • Opcode Fuzzy Hash: 08143a1026032b8c70ea413cf620a297200a47accafa3aa30c34bce4ec65beb9
              • Instruction Fuzzy Hash: BDE1B030664742DFD726CF28C985B2ABBE0BB84314F144A1DFAA5CB2E2D774D945CB42
              Strings
              • RTL: Re-Waiting, xrefs: 01257BAC
              • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 01257B7F
              • RTL: Resource at %p, xrefs: 01257B8E
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
              • API String ID: 0-871070163
              • Opcode ID: 2488c861745ec4fb0d21453938d3e28d513e691e6b099ed40e6f2cae7a8971b9
              • Instruction ID: a7257c4361ba55e0d1a682061d09fc4d07c7bd9b1dc56b9806b891579fb3e9ff
              • Opcode Fuzzy Hash: 2488c861745ec4fb0d21453938d3e28d513e691e6b099ed40e6f2cae7a8971b9
              • Instruction Fuzzy Hash: E641C2317617039FD724DE29C841B6AB7F5EFA8710F100A1DFA56DB680DB71E8058B91
              APIs
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0125728C
              Strings
              • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 01257294
              • RTL: Re-Waiting, xrefs: 012572C1
              • RTL: Resource at %p, xrefs: 012572A3
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
              • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
              • API String ID: 885266447-605551621
              • Opcode ID: 1951679d5d1a3d4c231977e04dc07ddc1cc6c6bb6cce6c5816fe4276310ff5b9
              • Instruction ID: a529b63c735808e7f24160460bfdc389e33076c30e960811e136b4301fb309ad
              • Opcode Fuzzy Hash: 1951679d5d1a3d4c231977e04dc07ddc1cc6c6bb6cce6c5816fe4276310ff5b9
              • Instruction Fuzzy Hash: 8041E3317A0207ABD721DE29CC81B6AB7F5FBA4750F104619FE55EB280DB71E8428BD1
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: ___swprintf_l
              • String ID: %%%u$]:%u
              • API String ID: 48624451-3050659472
              • Opcode ID: f4ff80d48d418eaf81586584e2be8490f55bcf1c901cb9c011f32c4817d9717b
              • Instruction ID: bc7c88baff06b1adaeebf1687acee44d3aea5473c07922cc80730c06c7da0211
              • Opcode Fuzzy Hash: f4ff80d48d418eaf81586584e2be8490f55bcf1c901cb9c011f32c4817d9717b
              • Instruction Fuzzy Hash: E7315472A20219EFDF24DF2DDC41BFE77F8EB54610F444559E949E3240EB30AA458BA4
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: __aulldvrm
              • String ID: +$-
              • API String ID: 1302938615-2137968064
              • Opcode ID: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
              • Instruction ID: 90a84ad80e6986eb25ef25aa2b3d96519bbbfa77cb2a6953997133c378befc15
              • Opcode Fuzzy Hash: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
              • Instruction Fuzzy Hash: F791D871E28237BBDB24DF6DC881ABEBBA5BF64320F14451AEA55E72C0D774C9408721
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID:
              • String ID: $$@
              • API String ID: 0-1194432280
              • Opcode ID: bc6c142c320df1043156639dece1bc48aa5ce3768b8a802ab9624fec9844164f
              • Instruction ID: 70888d485180947530f59349042719a8f97dafb5420140549adf5d1b4d4be4d8
              • Opcode Fuzzy Hash: bc6c142c320df1043156639dece1bc48aa5ce3768b8a802ab9624fec9844164f
              • Instruction Fuzzy Hash: 1B811B71D1026ADBDB39DB94DC44BEEB6B4AB48754F0041DAEA19B7280D7709E84CFA0
              APIs
              • @_EH4_CallFilterFunc@8.LIBCMT ref: 0126CFBD
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.2229987491.00000000011B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 011B0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_11b0000_Bien nhan thanh toan Swift Message 38579130 VND8509509220_pdf.jbxd
              Similarity
              • API ID: CallFilterFunc@8
              • String ID: @$@4Cw@4Cw
              • API String ID: 4062629308-3101775584
              • Opcode ID: 61cafbf6f193f56da610561baf25bdc80b28aef568c3738b0859f0288807be05
              • Instruction ID: 01498065af20635e0992906cd8284ed9cab6ef9af3ed862a5b0b36631de66780
              • Opcode Fuzzy Hash: 61cafbf6f193f56da610561baf25bdc80b28aef568c3738b0859f0288807be05
              • Instruction Fuzzy Hash: AB41D1B1E2021ADFDB21DF99D940AADBBB8FF54714F00402EEA55DB294D774C841CB61

              Execution Graph

              Execution Coverage:2.3%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:4.7%
              Total number of Nodes:444
              Total number of Limit Nodes:15
              execution_graph 13794 11587dd9 13796 11587df0 13794->13796 13795 11587ecd 13796->13795 13797 1158b382 ObtainUserAgentString 13796->13797 13797->13795 13640 115842dd 13644 1158431a 13640->13644 13641 115843fa 13642 11584328 SleepEx 13642->13642 13642->13644 13644->13641 13644->13642 13647 1158ef12 13644->13647 13656 11585432 13644->13656 13666 115840f2 13644->13666 13655 1158ef48 13647->13655 13648 1158f134 13648->13644 13649 1158f0e9 13650 1158f125 13649->13650 13684 1158e842 13649->13684 13692 1158e922 13650->13692 13654 1158f232 NtCreateFile 13654->13655 13655->13648 13655->13649 13655->13654 13672 1158ff82 13655->13672 13657 1158545b 13656->13657 13665 115854c9 13656->13665 13658 1158f232 NtCreateFile 13657->13658 13657->13665 13659 11585496 13658->13659 13660 115854c5 13659->13660 13713 11585082 13659->13713 13661 1158f232 NtCreateFile 13660->13661 13660->13665 13661->13665 13663 115854b6 13663->13660 13722 11584f52 13663->13722 13665->13644 13667 11584109 13666->13667 13668 115841d3 13666->13668 13727 11584012 13667->13727 13668->13644 13670 11584113 13670->13668 13671 1158ff82 6 API calls 13670->13671 13671->13668 13673 1158ffb8 13672->13673 13674 11590022 13673->13674 13677 11590081 13673->13677 13700 1158c5b2 13673->13700 13674->13655 13676 11590134 13676->13674 13683 115901b2 13676->13683 13703 1158c732 13676->13703 13677->13674 13677->13676 13679 11590117 getaddrinfo 13677->13679 13679->13676 13681 115907f4 setsockopt recv 13681->13674 13682 11590729 13682->13674 13682->13681 13683->13674 13706 1158c6b2 13683->13706 13685 1158e86d 13684->13685 13709 1158f232 13685->13709 13687 1158e906 13687->13649 13688 1158e888 13688->13687 13689 1158ff82 6 API calls 13688->13689 13690 1158e8c5 13688->13690 13689->13690 13690->13687 13691 1158f232 NtCreateFile 13690->13691 13691->13687 13693 1158e9c2 13692->13693 13694 1158f232 NtCreateFile 13693->13694 13697 1158e9d6 13694->13697 13695 1158ea9f 13695->13648 13696 1158ea5d 13696->13695 13698 1158f232 NtCreateFile 13696->13698 13697->13695 13697->13696 13699 1158ff82 6 API calls 13697->13699 13698->13695 13699->13696 13701 1158c60a socket 13700->13701 13702 1158c5ec 13700->13702 13701->13677 13702->13701 13704 1158c788 connect 13703->13704 13705 1158c76a 13703->13705 13704->13683 13705->13704 13707 1158c705 send 13706->13707 13708 1158c6e7 13706->13708 13707->13682 13708->13707 13711 1158f25c 13709->13711 13712 1158f334 13709->13712 13710 1158f410 NtCreateFile 13710->13712 13711->13710 13711->13712 13712->13688 13714 11585420 13713->13714 13715 115850aa 13713->13715 13714->13663 13715->13714 13716 1158f232 NtCreateFile 13715->13716 13717 115851f9 13716->13717 13718 1158f232 NtCreateFile 13717->13718 13721 115853df 13717->13721 13719 115853c9 13718->13719 13720 1158f232 NtCreateFile 13719->13720 13720->13721 13721->13663 13723 11584f70 13722->13723 13724 11584f84 13722->13724 13723->13660 13725 1158f232 NtCreateFile 13724->13725 13726 11585046 13725->13726 13726->13660 13729 11584031 13727->13729 13728 115840cd 13728->13670 13729->13728 13730 1158ff82 6 API calls 13729->13730 13730->13728 13898 11587edd 13900 11587f06 13898->13900 13899 11587fa4 13900->13899 13901 115848f2 NtProtectVirtualMemory 13900->13901 13902 11587f9c 13901->13902 13903 1158b382 ObtainUserAgentString 13902->13903 13903->13899 13862 11591a1f 13863 11591a25 13862->13863 13866 115855f2 13863->13866 13865 11591a3d 13867 1158560e 13866->13867 13868 115855fb 13866->13868 13867->13865 13868->13867 13869 1158a662 6 API calls 13868->13869 13869->13867 13751 11590e12 13752 1158f942 13751->13752 13753 11590e45 NtProtectVirtualMemory 13752->13753 13754 11590e70 13753->13754 13870 11585613 13871 11585620 13870->13871 13872 11585684 13871->13872 13873 11590e12 NtProtectVirtualMemory 13871->13873 13873->13871 13904 11589cd4 13906 11589cd8 13904->13906 13905 1158a022 13906->13905 13910 11589352 13906->13910 13908 11589f0d 13908->13905 13919 11589792 13908->13919 13912 1158939e 13910->13912 13911 1158958e 13911->13908 13912->13911 13913 115894ec 13912->13913 13915 11589595 13912->13915 13914 1158f232 NtCreateFile 13913->13914 13917 115894ff 13914->13917 13915->13911 13916 1158f232 NtCreateFile 13915->13916 13916->13911 13917->13911 13918 1158f232 NtCreateFile 13917->13918 13918->13911 13920 115897e0 13919->13920 13921 1158f232 NtCreateFile 13920->13921 13924 1158990c 13921->13924 13922 11589af3 13922->13908 13923 11589352 NtCreateFile 13923->13924 13924->13922 13924->13923 13925 11589602 NtCreateFile 13924->13925 13925->13924 13755 1158914a 13756 11589174 13755->13756 13757 11589153 13755->13757 13758 115891e7 13756->13758 13763 115841f2 13756->13763 13759 1158b382 ObtainUserAgentString 13757->13759 13760 1158916c 13759->13760 13761 115840f2 6 API calls 13760->13761 13761->13756 13764 115842c9 13763->13764 13765 1158420f 13763->13765 13764->13756 13766 1158ef12 7 API calls 13765->13766 13768 11584242 13765->13768 13766->13768 13767 11584289 13767->13764 13769 115840f2 6 API calls 13767->13769 13768->13767 13770 11585432 NtCreateFile 13768->13770 13769->13764 13770->13767 13874 11590e0a 13875 11590e45 NtProtectVirtualMemory 13874->13875 13876 1158f942 13874->13876 13877 11590e70 13875->13877 13876->13875 13854 11591a4d 13855 11591a53 13854->13855 13858 11585782 13855->13858 13857 11591a6b 13860 1158578f 13858->13860 13859 115857ad 13859->13857 13860->13859 13861 1158a662 6 API calls 13860->13861 13861->13859 13735 1158ff82 13736 1158ffb8 13735->13736 13737 11590022 13736->13737 13738 1158c5b2 socket 13736->13738 13740 11590081 13736->13740 13738->13740 13739 11590134 13739->13737 13741 1158c732 connect 13739->13741 13746 115901b2 13739->13746 13740->13737 13740->13739 13742 11590117 getaddrinfo 13740->13742 13741->13746 13742->13739 13743 1158c6b2 send 13745 11590729 13743->13745 13744 115907f4 setsockopt recv 13744->13737 13745->13737 13745->13744 13746->13737 13746->13743 13970 1158c0b9 13971 1158c0ed 13970->13971 13973 1158c1f0 13970->13973 13972 1158ff82 6 API calls 13971->13972 13971->13973 13972->13973 13771 1158ff7a 13773 1158ffb8 13771->13773 13772 11590022 13773->13772 13774 1158c5b2 socket 13773->13774 13776 11590081 13773->13776 13774->13776 13775 11590134 13775->13772 13777 1158c732 connect 13775->13777 13782 115901b2 13775->13782 13776->13772 13776->13775 13778 11590117 getaddrinfo 13776->13778 13777->13782 13778->13775 13779 1158c6b2 send 13781 11590729 13779->13781 13780 115907f4 setsockopt recv 13780->13772 13781->13772 13781->13780 13782->13772 13782->13779 13878 1158e83a 13879 1158e841 13878->13879 13880 1158ff82 6 API calls 13879->13880 13882 1158e8c5 13880->13882 13881 1158e906 13882->13881 13883 1158f232 NtCreateFile 13882->13883 13883->13881 13926 115880fb 13928 11588137 13926->13928 13927 115882d5 13928->13927 13929 115848f2 NtProtectVirtualMemory 13928->13929 13930 1158828a 13929->13930 13931 115848f2 NtProtectVirtualMemory 13930->13931 13934 115882a9 13931->13934 13932 115882cd 13933 1158b382 ObtainUserAgentString 13932->13933 13933->13927 13934->13932 13935 115848f2 NtProtectVirtualMemory 13934->13935 13935->13932 13974 1158a8be 13975 1158a8c3 13974->13975 13976 1158a9a6 13975->13976 13977 1158a995 ObtainUserAgentString 13975->13977 13977->13976 13829 11587fbf 13830 11588016 13829->13830 13832 115880bb 13830->13832 13834 115880f0 13830->13834 13835 115848f2 NtProtectVirtualMemory 13830->13835 13831 115880e8 13833 1158b382 ObtainUserAgentString 13831->13833 13832->13831 13836 115848f2 NtProtectVirtualMemory 13832->13836 13833->13834 13835->13832 13836->13831 13798 115919f1 13799 115919f7 13798->13799 13802 11586852 13799->13802 13801 11591a0f 13803 115868e4 13802->13803 13804 11586865 13802->13804 13803->13801 13804->13803 13806 11586887 13804->13806 13808 1158687e 13804->13808 13805 1158c36f 13805->13801 13806->13803 13810 1158a662 13806->13810 13808->13805 13821 1158c0c2 13808->13821 13811 1158a66b 13810->13811 13819 1158a7ba 13810->13819 13812 115840f2 6 API calls 13811->13812 13811->13819 13814 1158a6ee 13812->13814 13813 1158a750 13816 1158a83f 13813->13816 13818 1158a791 13813->13818 13813->13819 13814->13813 13815 1158ff82 6 API calls 13814->13815 13815->13813 13817 1158ff82 6 API calls 13816->13817 13816->13819 13817->13819 13818->13819 13820 1158ff82 6 API calls 13818->13820 13819->13803 13820->13819 13822 1158c1f0 13821->13822 13823 1158c0cb 13821->13823 13822->13805 13823->13822 13824 1158ff82 6 API calls 13823->13824 13824->13822 13825 115855f1 13826 1158560e 13825->13826 13827 11585606 13825->13827 13828 1158a662 6 API calls 13827->13828 13828->13826 13936 115840f1 13937 11584109 13936->13937 13941 115841d3 13936->13941 13938 11584012 6 API calls 13937->13938 13939 11584113 13938->13939 13940 1158ff82 6 API calls 13939->13940 13939->13941 13940->13941 13747 1158f232 13749 1158f25c 13747->13749 13750 1158f334 13747->13750 13748 1158f410 NtCreateFile 13748->13750 13749->13748 13749->13750 13837 115919b3 13838 115919bd 13837->13838 13841 115866d2 13838->13841 13840 115919e0 13842 11586704 13841->13842 13843 115866f7 13841->13843 13844 115866ff 13842->13844 13846 1158672d 13842->13846 13848 11586737 13842->13848 13845 115840f2 6 API calls 13843->13845 13844->13840 13845->13844 13850 1158c2c2 13846->13850 13848->13844 13849 1158ff82 6 API calls 13848->13849 13849->13844 13851 1158c2cb 13850->13851 13852 1158c2df 13850->13852 13851->13852 13853 1158c0c2 6 API calls 13851->13853 13852->13844 13853->13852 13942 115882f4 13943 11588349 13942->13943 13944 1158849f 13943->13944 13946 115848f2 NtProtectVirtualMemory 13943->13946 13945 115848f2 NtProtectVirtualMemory 13944->13945 13949 115884c3 13944->13949 13945->13949 13947 11588480 13946->13947 13948 115848f2 NtProtectVirtualMemory 13947->13948 13948->13944 13950 115848f2 NtProtectVirtualMemory 13949->13950 13951 11588597 13949->13951 13950->13951 13952 115848f2 NtProtectVirtualMemory 13951->13952 13954 115885bf 13951->13954 13952->13954 13953 115886e1 13955 1158b382 ObtainUserAgentString 13953->13955 13956 115848f2 NtProtectVirtualMemory 13954->13956 13957 115886b9 13954->13957 13958 115886e9 13955->13958 13956->13957 13957->13953 13959 115848f2 NtProtectVirtualMemory 13957->13959 13959->13953 13978 11591aa9 13979 11591aaf 13978->13979 13982 1158c212 13979->13982 13981 11591ac7 13983 1158c21b 13982->13983 13984 1158c237 13982->13984 13983->13984 13985 1158c0c2 6 API calls 13983->13985 13984->13981 13985->13984 13884 1158b22a 13885 1158b25e 13884->13885 13886 1158a8c2 ObtainUserAgentString 13885->13886 13887 1158b26b 13886->13887 13492 11590bac 13493 11590bb1 13492->13493 13526 11590bb6 13493->13526 13527 11586b72 13493->13527 13495 11590c2c 13496 11590c85 13495->13496 13498 11590c69 13495->13498 13499 11590c54 13495->13499 13495->13526 13497 1158eab2 NtProtectVirtualMemory 13496->13497 13500 11590c8d 13497->13500 13502 11590c6e 13498->13502 13503 11590c80 13498->13503 13501 1158eab2 NtProtectVirtualMemory 13499->13501 13563 11588102 13500->13563 13505 11590c5c 13501->13505 13506 1158eab2 NtProtectVirtualMemory 13502->13506 13503->13496 13507 11590c97 13503->13507 13549 11587ee2 13505->13549 13511 11590c76 13506->13511 13508 11590c9c 13507->13508 13509 11590cbe 13507->13509 13531 1158eab2 13508->13531 13513 11590cd9 13509->13513 13514 11590cc7 13509->13514 13509->13526 13555 11587fc2 13511->13555 13518 1158eab2 NtProtectVirtualMemory 13513->13518 13513->13526 13515 1158eab2 NtProtectVirtualMemory 13514->13515 13517 11590ccf 13515->13517 13573 115882f2 13517->13573 13521 11590ce5 13518->13521 13591 11588712 13521->13591 13529 11586b93 13527->13529 13528 11586cce 13528->13495 13529->13528 13530 11586cb5 CreateMutexW 13529->13530 13530->13528 13533 1158eadf 13531->13533 13532 1158eebc 13541 11587de2 13532->13541 13533->13532 13603 115848f2 13533->13603 13535 1158ee5c 13536 115848f2 NtProtectVirtualMemory 13535->13536 13537 1158ee7c 13536->13537 13538 115848f2 NtProtectVirtualMemory 13537->13538 13539 1158ee9c 13538->13539 13540 115848f2 NtProtectVirtualMemory 13539->13540 13540->13532 13542 11587df0 13541->13542 13544 11587ecd 13542->13544 13628 1158b382 13542->13628 13545 11584412 13544->13545 13547 11584440 13545->13547 13546 11584473 13546->13526 13547->13546 13548 1158444d CreateThread 13547->13548 13548->13526 13551 11587f06 13549->13551 13550 11587fa4 13550->13526 13551->13550 13552 115848f2 NtProtectVirtualMemory 13551->13552 13553 11587f9c 13552->13553 13554 1158b382 ObtainUserAgentString 13553->13554 13554->13550 13557 11588016 13555->13557 13556 115880f0 13556->13526 13557->13556 13560 115880bb 13557->13560 13561 115848f2 NtProtectVirtualMemory 13557->13561 13558 115880e8 13559 1158b382 ObtainUserAgentString 13558->13559 13559->13556 13560->13558 13562 115848f2 NtProtectVirtualMemory 13560->13562 13561->13560 13562->13558 13565 11588137 13563->13565 13564 115882d5 13564->13526 13565->13564 13566 115848f2 NtProtectVirtualMemory 13565->13566 13567 1158828a 13566->13567 13568 115848f2 NtProtectVirtualMemory 13567->13568 13570 115882a9 13568->13570 13569 115882cd 13571 1158b382 ObtainUserAgentString 13569->13571 13570->13569 13572 115848f2 NtProtectVirtualMemory 13570->13572 13571->13564 13572->13569 13575 11588349 13573->13575 13574 1158849f 13576 115848f2 NtProtectVirtualMemory 13574->13576 13580 115884c3 13574->13580 13575->13574 13577 115848f2 NtProtectVirtualMemory 13575->13577 13576->13580 13578 11588480 13577->13578 13579 115848f2 NtProtectVirtualMemory 13578->13579 13579->13574 13581 115848f2 NtProtectVirtualMemory 13580->13581 13582 11588597 13580->13582 13581->13582 13583 115848f2 NtProtectVirtualMemory 13582->13583 13586 115885bf 13582->13586 13583->13586 13584 115886b9 13585 115886e1 13584->13585 13590 115848f2 NtProtectVirtualMemory 13584->13590 13587 1158b382 ObtainUserAgentString 13585->13587 13586->13584 13588 115848f2 NtProtectVirtualMemory 13586->13588 13589 115886e9 13587->13589 13588->13584 13589->13526 13590->13585 13592 11588767 13591->13592 13593 115848f2 NtProtectVirtualMemory 13592->13593 13596 11588903 13592->13596 13594 115888e3 13593->13594 13595 115848f2 NtProtectVirtualMemory 13594->13595 13595->13596 13599 115848f2 NtProtectVirtualMemory 13596->13599 13600 11588992 13596->13600 13597 115889b7 13598 1158b382 ObtainUserAgentString 13597->13598 13601 115889bf 13598->13601 13599->13600 13600->13597 13602 115848f2 NtProtectVirtualMemory 13600->13602 13601->13526 13602->13597 13604 11584987 13603->13604 13607 115849b2 13604->13607 13618 11585622 13604->13618 13606 11584c0c 13606->13535 13607->13606 13608 11584ba2 13607->13608 13610 11584ac5 13607->13610 13609 11590e12 NtProtectVirtualMemory 13608->13609 13617 11584b5b 13609->13617 13622 11590e12 13610->13622 13612 11590e12 NtProtectVirtualMemory 13612->13606 13613 11584ae3 13613->13606 13614 11584b3d 13613->13614 13615 11590e12 NtProtectVirtualMemory 13613->13615 13616 11590e12 NtProtectVirtualMemory 13614->13616 13615->13614 13616->13617 13617->13606 13617->13612 13619 1158567a 13618->13619 13620 11585684 13619->13620 13621 11590e12 NtProtectVirtualMemory 13619->13621 13620->13607 13621->13619 13626 1158f942 13622->13626 13624 11590e45 NtProtectVirtualMemory 13625 11590e70 13624->13625 13625->13613 13627 1158f967 13626->13627 13627->13624 13629 1158b3c7 13628->13629 13632 1158b232 13629->13632 13631 1158b438 13631->13544 13633 1158b25e 13632->13633 13636 1158a8c2 13633->13636 13635 1158b26b 13635->13631 13638 1158a934 13636->13638 13637 1158a9a6 13637->13635 13638->13637 13639 1158a995 ObtainUserAgentString 13638->13639 13639->13637 13791 1158c72e 13792 1158c788 connect 13791->13792 13793 1158c76a 13791->13793 13793->13792 13888 1158542e 13889 1158545b 13888->13889 13897 115854c9 13888->13897 13890 1158f232 NtCreateFile 13889->13890 13889->13897 13891 11585496 13890->13891 13893 11585082 NtCreateFile 13891->13893 13896 115854c5 13891->13896 13892 1158f232 NtCreateFile 13892->13897 13894 115854b6 13893->13894 13895 11584f52 NtCreateFile 13894->13895 13894->13896 13895->13896 13896->13892 13896->13897 13960 11589ce2 13962 11589dd9 13960->13962 13961 1158a022 13962->13961 13963 11589352 NtCreateFile 13962->13963 13964 11589f0d 13963->13964 13964->13961 13965 11589792 NtCreateFile 13964->13965 13965->13964 13966 1158c2e4 13967 1158c36f 13966->13967 13968 1158c305 13966->13968 13968->13967 13969 1158c0c2 6 API calls 13968->13969 13969->13967 13787 11586b66 13789 11586b6a 13787->13789 13788 11586cce 13789->13788 13790 11586cb5 CreateMutexW 13789->13790 13790->13788

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 0 1158ff82-1158ffb6 1 1158ffb8-1158ffbc 0->1 2 1158ffd6-1158ffd9 0->2 1->2 3 1158ffbe-1158ffc2 1->3 4 115908fe-1159090c 2->4 5 1158ffdf-1158ffed 2->5 3->2 6 1158ffc4-1158ffc8 3->6 7 1158fff3-1158fff7 5->7 8 115908f6-115908f7 5->8 6->2 9 1158ffca-1158ffce 6->9 10 1158fff9-1158fffd 7->10 11 1158ffff-11590000 7->11 8->4 9->2 12 1158ffd0-1158ffd4 9->12 10->11 13 1159000a-11590010 10->13 11->13 12->2 12->5 14 1159003a-11590060 13->14 15 11590012-11590020 13->15 16 11590068-1159007c call 1158c5b2 14->16 17 11590062-11590066 14->17 15->14 18 11590022-11590026 15->18 22 11590081-115900a2 16->22 17->16 19 115900a8-115900ab 17->19 18->8 21 1159002c-11590035 18->21 23 115900b1-115900b8 19->23 24 11590144-11590150 19->24 21->8 22->19 25 115908ee-115908ef 22->25 27 115900ba-115900dc call 1158f942 23->27 28 115900e2-115900f5 23->28 24->25 26 11590156-11590165 24->26 25->8 29 1159017f-1159018f 26->29 30 11590167-11590178 call 1158c552 26->30 27->28 28->25 32 115900fb-11590101 28->32 34 11590191-115901ad call 1158c732 29->34 35 115901e5-1159021b 29->35 30->29 32->25 37 11590107-11590109 32->37 43 115901b2-115901da 34->43 40 1159022d-11590231 35->40 41 1159021d-1159022b 35->41 37->25 42 1159010f-11590111 37->42 45 11590233-11590245 40->45 46 11590247-1159024b 40->46 44 1159027f-11590280 41->44 42->25 47 11590117-11590132 getaddrinfo 42->47 43->35 52 115901dc-115901e1 43->52 51 11590283-115902e0 call 11590d62 call 1158d482 call 1158ce72 call 11591002 44->51 45->44 48 1159024d-1159025f 46->48 49 11590261-11590265 46->49 47->24 50 11590134-1159013c 47->50 48->44 53 1159026d-11590279 49->53 54 11590267-1159026b 49->54 50->24 63 115902e2-115902e6 51->63 64 115902f4-11590354 call 11590d92 51->64 52->35 53->44 54->51 54->53 63->64 66 115902e8-115902ef call 1158d042 63->66 69 1159035a-11590396 call 11590d62 call 11591262 call 11591002 64->69 70 1159048c-115904b8 call 11590d62 call 11591262 64->70 66->64 85 11590398-115903b7 call 11591262 call 11591002 69->85 86 115903bb-115903e9 call 11591262 * 2 69->86 79 115904d9-11590590 call 11591262 * 3 call 11591002 * 2 call 1158d482 70->79 80 115904ba-115904d5 70->80 112 11590595-115905b9 call 11591262 79->112 80->79 85->86 101 115903eb-11590410 call 11591002 call 11591262 86->101 102 11590415-1159041d 86->102 101->102 105 1159041f-11590425 102->105 106 11590442-11590448 102->106 109 11590467-11590487 call 11591262 105->109 110 11590427-1159043d 105->110 111 1159044e-11590456 106->111 106->112 109->112 110->112 111->112 117 1159045c-1159045d 111->117 121 115905bb-115905cc call 11591262 call 11591002 112->121 122 115905d1-115906ad call 11591262 * 7 call 11591002 call 11590d62 call 11591002 call 1158ce72 call 1158d042 112->122 117->109 132 115906af-115906b3 121->132 122->132 135 115906ff-1159072d call 1158c6b2 132->135 136 115906b5-115906fa call 1158c382 call 1158c7b2 132->136 143 1159075d-11590761 135->143 144 1159072f-11590735 135->144 158 115908e6-115908e7 136->158 148 1159090d-11590913 143->148 149 11590767-1159076b 143->149 144->143 147 11590737-1159074c 144->147 147->143 152 1159074e-11590754 147->152 153 11590779-11590784 148->153 154 11590919-11590920 148->154 155 115908aa-115908df call 1158c7b2 149->155 156 11590771-11590773 149->156 152->143 159 11590756 152->159 160 11590786-11590793 153->160 161 11590795-11590796 153->161 154->160 155->158 156->153 156->155 158->25 159->143 160->161 164 1159079c-115907a0 160->164 161->164 167 115907b1-115907b2 164->167 168 115907a2-115907af 164->168 170 115907b8-115907c4 167->170 168->167 168->170 173 115907f4-11590861 setsockopt recv 170->173 174 115907c6-115907ef call 11590d92 call 11590d62 170->174 177 115908a3-115908a4 173->177 178 11590863 173->178 174->173 177->155 178->177 181 11590865-1159086a 178->181 181->177 184 1159086c-11590872 181->184 184->177 186 11590874-115908a1 184->186 186->177 186->178
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3376444530.0000000011550000.00000040.80000000.00040000.00000000.sdmp, Offset: 11550000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_11550000_explorer.jbxd
              Similarity
              • API ID: getaddrinforecvsetsockopt
              • String ID: Co$&br=$&sql$&un=$: cl$GET $dat=$nnec$ose$tion
              • API String ID: 1564272048-1117930895
              • Opcode ID: 5de8858bceb6b52e8c11e308410fa1d1098ae4878da76a5e8b5a3db0c78a0a43
              • Instruction ID: 1dd015484318f407797f9a3fe2afb62cbd52e6a879bb588f5b3d281efdcd22fb
              • Opcode Fuzzy Hash: 5de8858bceb6b52e8c11e308410fa1d1098ae4878da76a5e8b5a3db0c78a0a43
              • Instruction Fuzzy Hash: AA527D34614A4D8BDB59EF68C4847EEB7E5FB94304F504A6EC4AFCB142EE30A545CB82

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 299 1158f232-1158f256 300 1158f25c-1158f260 299->300 301 1158f8bd-1158f8cd 299->301 300->301 302 1158f266-1158f2a0 300->302 303 1158f2bf 302->303 304 1158f2a2-1158f2a6 302->304 306 1158f2c6 303->306 304->303 305 1158f2a8-1158f2ac 304->305 307 1158f2ae-1158f2b2 305->307 308 1158f2b4-1158f2b8 305->308 309 1158f2cb-1158f2cf 306->309 307->306 308->309 310 1158f2ba-1158f2bd 308->310 311 1158f2f9-1158f30b 309->311 312 1158f2d1-1158f2f7 call 1158f942 309->312 310->309 316 1158f378 311->316 317 1158f30d-1158f332 311->317 312->311 312->316 320 1158f37a-1158f3a0 316->320 318 1158f3a1-1158f3a8 317->318 319 1158f334-1158f33b 317->319 323 1158f3aa-1158f3d3 call 1158f942 318->323 324 1158f3d5-1158f3dc 318->324 321 1158f33d-1158f360 call 1158f942 319->321 322 1158f366-1158f370 319->322 321->322 322->316 328 1158f372-1158f373 322->328 323->316 323->324 325 1158f3de-1158f40a call 1158f942 324->325 326 1158f410-1158f458 NtCreateFile call 1158f172 324->326 325->316 325->326 335 1158f45d-1158f45f 326->335 328->316 335->316 336 1158f465-1158f46d 335->336 336->316 337 1158f473-1158f476 336->337 338 1158f478-1158f481 337->338 339 1158f486-1158f48d 337->339 338->320 340 1158f48f-1158f4b8 call 1158f942 339->340 341 1158f4c2-1158f4ec 339->341 340->316 346 1158f4be-1158f4bf 340->346 347 1158f8ae-1158f8b8 341->347 348 1158f4f2-1158f4f5 341->348 346->341 347->316 349 1158f4fb-1158f4fe 348->349 350 1158f604-1158f611 348->350 351 1158f55e-1158f561 349->351 352 1158f500-1158f507 349->352 350->320 357 1158f616-1158f619 351->357 358 1158f567-1158f572 351->358 354 1158f538-1158f559 352->354 355 1158f509-1158f532 call 1158f942 352->355 362 1158f5e9-1158f5fa 354->362 355->316 355->354 360 1158f6b8-1158f6bb 357->360 361 1158f61f-1158f626 357->361 363 1158f5a3-1158f5a6 358->363 364 1158f574-1158f59d call 1158f942 358->364 366 1158f739-1158f73c 360->366 367 1158f6bd-1158f6c4 360->367 369 1158f628-1158f651 call 1158f942 361->369 370 1158f657-1158f66b call 11590e92 361->370 362->350 363->316 365 1158f5ac-1158f5b6 363->365 364->316 364->363 365->316 373 1158f5bc-1158f5e6 365->373 377 1158f742-1158f749 366->377 378 1158f7c4-1158f7c7 366->378 374 1158f6f5-1158f734 367->374 375 1158f6c6-1158f6ef call 1158f942 367->375 369->316 369->370 370->316 387 1158f671-1158f6b3 370->387 373->362 397 1158f894-1158f8a9 374->397 375->347 375->374 380 1158f77a-1158f7bf 377->380 381 1158f74b-1158f774 call 1158f942 377->381 378->316 383 1158f7cd-1158f7d4 378->383 380->397 381->347 381->380 388 1158f7fc-1158f803 383->388 389 1158f7d6-1158f7f6 call 1158f942 383->389 387->320 395 1158f82b-1158f835 388->395 396 1158f805-1158f825 call 1158f942 388->396 389->388 395->347 398 1158f837-1158f83e 395->398 396->395 397->320 398->347 402 1158f840-1158f886 398->402 402->397
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3376444530.0000000011550000.00000040.80000000.00040000.00000000.sdmp, Offset: 11550000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_11550000_explorer.jbxd
              Similarity
              • API ID: CreateFile
              • String ID: `
              • API String ID: 823142352-2679148245
              • Opcode ID: de128a41b66c8ec8222e6cdebfc92e8119e2b93de7d93fbb6a18759800a4d987
              • Instruction ID: 96c9af357d4863f2af39e8ee14cfa83c01bf2a07477a9ccbc04151c04fee552a
              • Opcode Fuzzy Hash: de128a41b66c8ec8222e6cdebfc92e8119e2b93de7d93fbb6a18759800a4d987
              • Instruction Fuzzy Hash: 53224770A18B0A9FDB49DF29C4986AEB7E1FB9C305F50062EE55ED3250DF30A451CB82

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 443 11590e12-11590e6e call 1158f942 NtProtectVirtualMemory 446 11590e7d-11590e8f 443->446 447 11590e70-11590e7c 443->447
              APIs
              • NtProtectVirtualMemory.NTDLL ref: 11590E67
              Memory Dump Source
              • Source File: 00000006.00000002.3376444530.0000000011550000.00000040.80000000.00040000.00000000.sdmp, Offset: 11550000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_11550000_explorer.jbxd
              Similarity
              • API ID: MemoryProtectVirtual
              • String ID:
              • API String ID: 2706961497-0
              • Opcode ID: 8fde5b3aa229c20c01e10f6c0a0911328a1d50ad6ca7dd15efa95d0be41baddf
              • Instruction ID: 000cd4420a14be811e6e394bef5db0e71b3a3f629b17cf81e898104a03d38fb8
              • Opcode Fuzzy Hash: 8fde5b3aa229c20c01e10f6c0a0911328a1d50ad6ca7dd15efa95d0be41baddf
              • Instruction Fuzzy Hash: 6C019E34628B884F8788EF6C948022AB7E4FBDD214F000B3EA99AC3250EB60C5414752

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 448 11590e0a-11590e38 449 11590e45-11590e6e NtProtectVirtualMemory 448->449 450 11590e40 call 1158f942 448->450 451 11590e7d-11590e8f 449->451 452 11590e70-11590e7c 449->452 450->449
              APIs
              • NtProtectVirtualMemory.NTDLL ref: 11590E67
              Memory Dump Source
              • Source File: 00000006.00000002.3376444530.0000000011550000.00000040.80000000.00040000.00000000.sdmp, Offset: 11550000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_11550000_explorer.jbxd
              Similarity
              • API ID: MemoryProtectVirtual
              • String ID:
              • API String ID: 2706961497-0
              • Opcode ID: d782dca5996f3574fd0c4455d89641a9bf745bba617b6185d934ac73d2235392
              • Instruction ID: 85dae5f613fd40db7204f20e8e1f1f311e60682eeafb87df9d41a49a574a7da1
              • Opcode Fuzzy Hash: d782dca5996f3574fd0c4455d89641a9bf745bba617b6185d934ac73d2235392
              • Instruction Fuzzy Hash: 6B01A23462CB884F8748EF2C94412A6B3E5FBCE314F000B3EE99AC3240DB21D5024782

              Control-flow Graph

              APIs
              • ObtainUserAgentString.URLMON ref: 1158A9A0
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3376444530.0000000011550000.00000040.80000000.00040000.00000000.sdmp, Offset: 11550000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_11550000_explorer.jbxd
              Similarity
              • API ID: AgentObtainStringUser
              • String ID: User-Agent: $nt: $on.d$urlmon.dll
              • API String ID: 2681117516-319646191
              • Opcode ID: fab8d4f3d63e7cb3a61fc22749300fb1f1c56e9464b264e147718cbb7a7b3fb5
              • Instruction ID: 7662109f2d99c0a5400014234366088b62cfdaa954e0ab4e5eb7201e7cbdfb8b
              • Opcode Fuzzy Hash: fab8d4f3d63e7cb3a61fc22749300fb1f1c56e9464b264e147718cbb7a7b3fb5
              • Instruction Fuzzy Hash: FD31D131614A5D8BCB04EFA9C8847EDB7E0FB98219F40022AD44ED7240EF749645C78A

              Control-flow Graph

              APIs
              • ObtainUserAgentString.URLMON ref: 1158A9A0
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3376444530.0000000011550000.00000040.80000000.00040000.00000000.sdmp, Offset: 11550000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_11550000_explorer.jbxd
              Similarity
              • API ID: AgentObtainStringUser
              • String ID: User-Agent: $nt: $on.d$urlmon.dll
              • API String ID: 2681117516-319646191
              • Opcode ID: 89ed80dc1d123a3fdb33b1283e784163d7980008e053a39b7e2b7c015d122c3c
              • Instruction ID: 50b0e2e56cbcf0e14d527c3ec1fef5f719491a671ec9d3eeb04d61d1e0c40d6f
              • Opcode Fuzzy Hash: 89ed80dc1d123a3fdb33b1283e784163d7980008e053a39b7e2b7c015d122c3c
              • Instruction Fuzzy Hash: 9E21D234614A5D8BCB05EFA9C8847EDBBE0FF98219F40422AD45AD7240EF749645CB8A

              Control-flow Graph

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3376444530.0000000011550000.00000040.80000000.00040000.00000000.sdmp, Offset: 11550000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_11550000_explorer.jbxd
              Similarity
              • API ID: CreateMutex
              • String ID: .dll$el32$kern
              • API String ID: 1964310414-1222553051
              • Opcode ID: 440592a6460f4a8a809c4e0f2019460d4d12f006c7151b444d4376acf3ab05fa
              • Instruction ID: 449d4c1f7384fc8006eae3c270ac8ecde5854cfd60199fbd66422900934ea83b
              • Opcode Fuzzy Hash: 440592a6460f4a8a809c4e0f2019460d4d12f006c7151b444d4376acf3ab05fa
              • Instruction Fuzzy Hash: 7B415A74918A1C8FDB44EFA8C8D57AD77E0FBA8304F00457AC84EDB255EE309945CB96

              Control-flow Graph

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3376444530.0000000011550000.00000040.80000000.00040000.00000000.sdmp, Offset: 11550000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_11550000_explorer.jbxd
              Similarity
              • API ID: CreateMutex
              • String ID: .dll$el32$kern
              • API String ID: 1964310414-1222553051
              • Opcode ID: d29081eafe973aeb990ac80f5dcafeb95ade16b14a0ff6f6c0f9231c9beedf12
              • Instruction ID: b0f1a8199935269cece9f748ea85305cc863b2250425fddd89b9d8b3e48e1379
              • Opcode Fuzzy Hash: d29081eafe973aeb990ac80f5dcafeb95ade16b14a0ff6f6c0f9231c9beedf12
              • Instruction Fuzzy Hash: 1B413974918A1C8FDB84EFA8C4D9BAD77F0FBA8304F04416AC84EDB255DE30A945CB95

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 289 1158c72e-1158c768 290 1158c788-1158c7ab connect 289->290 291 1158c76a-1158c782 call 1158f942 289->291 291->290
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3376444530.0000000011550000.00000040.80000000.00040000.00000000.sdmp, Offset: 11550000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_11550000_explorer.jbxd
              Similarity
              • API ID: connect
              • String ID: conn$ect
              • API String ID: 1959786783-716201944
              • Opcode ID: d2c20d592f91275318b70c66aa45ff63ae11574d98dcf1710f59c05c574d9bfb
              • Instruction ID: 6f62fbb499ebb164d15e16d2be859a5a62c7d00a9ba5abef73b9bf973b8e4a6b
              • Opcode Fuzzy Hash: d2c20d592f91275318b70c66aa45ff63ae11574d98dcf1710f59c05c574d9bfb
              • Instruction Fuzzy Hash: 6D011E74618B188FCB84EF5CE088B55B7E0FB69314F1545AED90DCB266C774D9818BC2

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 294 1158c732-1158c768 295 1158c788-1158c7ab connect 294->295 296 1158c76a-1158c782 call 1158f942 294->296 296->295
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3376444530.0000000011550000.00000040.80000000.00040000.00000000.sdmp, Offset: 11550000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_11550000_explorer.jbxd
              Similarity
              • API ID: connect
              • String ID: conn$ect
              • API String ID: 1959786783-716201944
              • Opcode ID: 640b8c0ab7b1bb3acdb51d34daf9cec4a3878eee67c7b90e610521ed962b484b
              • Instruction ID: e04c53b1b7ab9d7681382772b38633e3f25b4e1bc73fbc3ea17aa97eae824bdf
              • Opcode Fuzzy Hash: 640b8c0ab7b1bb3acdb51d34daf9cec4a3878eee67c7b90e610521ed962b484b
              • Instruction Fuzzy Hash: EE012C70618A1C8FCB84EF5CE088B55B7E0FB59314F1541AEA90DCB226CB74D9818BC2

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 407 1158c6b2-1158c6e5 408 1158c705-1158c72d send 407->408 409 1158c6e7-1158c6ff call 1158f942 407->409 409->408
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3376444530.0000000011550000.00000040.80000000.00040000.00000000.sdmp, Offset: 11550000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_11550000_explorer.jbxd
              Similarity
              • API ID: send
              • String ID: send
              • API String ID: 2809346765-2809346765
              • Opcode ID: bba6785c5ab04fc1c912927f20b2eaf94db183ef6292e2548e0bd7e75e2cf9a2
              • Instruction ID: 86c278b6ac8afa3886afd29c4a76550917d8ebba5dbed04fb1e71d9a9f03bfaf
              • Opcode Fuzzy Hash: bba6785c5ab04fc1c912927f20b2eaf94db183ef6292e2548e0bd7e75e2cf9a2
              • Instruction Fuzzy Hash: D8011270518A598FDBC4EF1CD048B1577E0EB58314F1545AED85DCB266C670D8818B85

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 412 1158c5b2-1158c5ea 413 1158c60a-1158c62b socket 412->413 414 1158c5ec-1158c604 call 1158f942 412->414 414->413
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3376444530.0000000011550000.00000040.80000000.00040000.00000000.sdmp, Offset: 11550000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_11550000_explorer.jbxd
              Similarity
              • API ID: socket
              • String ID: sock
              • API String ID: 98920635-2415254727
              • Opcode ID: 205056058728d72a76f2a9c444eb1655fc63b7523a02cb36171bec795444162f
              • Instruction ID: 4067e59e853b0562053042f95e63ebfaa29f99c3f55f39e3ff2a2751e116b6cf
              • Opcode Fuzzy Hash: 205056058728d72a76f2a9c444eb1655fc63b7523a02cb36171bec795444162f
              • Instruction Fuzzy Hash: F2014F70618A1C8FCB84EF1DE048B54BBE0FB59314F1545AEE85EDB266C7B0D981CB86

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 417 115842dd-11584320 call 1158f942 420 115843fa-1158440e 417->420 421 11584326 417->421 422 11584328-11584339 SleepEx 421->422 422->422 423 1158433b-11584341 422->423 424 1158434b-11584352 423->424 425 11584343-11584349 423->425 426 11584370-11584376 424->426 427 11584354-1158435a 424->427 425->424 428 1158435c-1158436a call 1158ef12 425->428 430 11584378-1158437e 426->430 431 115843b7-115843bd 426->431 427->426 427->428 428->426 430->431 433 11584380-1158438a 430->433 434 115843bf-115843cf call 11584e72 431->434 435 115843d4-115843db 431->435 433->431 436 1158438c-115843b1 call 11585432 433->436 434->435 435->422 438 115843e1-115843f5 call 115840f2 435->438 436->431 438->422
              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.3376444530.0000000011550000.00000040.80000000.00040000.00000000.sdmp, Offset: 11550000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_11550000_explorer.jbxd
              Similarity
              • API ID: Sleep
              • String ID:
              • API String ID: 3472027048-0
              • Opcode ID: 2c485226c71f8ce073f7c86c27236fb263c26e76649b5794a31fce9b42c1bba6
              • Instruction ID: 082d4dd9d016de4b8388134f416db1fa3479af4c4b0ce35e1f91aa53bf6b8223
              • Opcode Fuzzy Hash: 2c485226c71f8ce073f7c86c27236fb263c26e76649b5794a31fce9b42c1bba6
              • Instruction Fuzzy Hash: 1D316B74614B4ADFDB54DF2A8088399BBA0FB54305F44427ECD2DCA106CB30A490CF92

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 453 11584412-11584446 call 1158f942 456 11584448-11584472 call 11591c9e CreateThread 453->456 457 11584473-1158447d 453->457
              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.3376444530.0000000011550000.00000040.80000000.00040000.00000000.sdmp, Offset: 11550000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_11550000_explorer.jbxd
              Similarity
              • API ID: CreateThread
              • String ID:
              • API String ID: 2422867632-0
              • Opcode ID: 86dfbf082f461ee8d50c48ad175151c38d579804c722c71aa6313b9ca1572f48
              • Instruction ID: 84358909a8e54134fd26966bcef6d2528578adf89a5a5338a89b198fe29ef550
              • Opcode Fuzzy Hash: 86dfbf082f461ee8d50c48ad175151c38d579804c722c71aa6313b9ca1572f48
              • Instruction Fuzzy Hash: 12F0C234268A4D4FD788EB2CD48563AB7D0EBE8214F41463EA94DC3264DA29D5828716
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3374776077.0000000010950000.00000040.00000001.00040000.00000000.sdmp, Offset: 10950000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_10950000_explorer.jbxd
              Similarity
              • API ID:
              • String ID: .dll$32.d$M$S$dll$el32$kern$ll$net.$user$wini
              • API String ID: 0-393284711
              • Opcode ID: 666e7131670ab6034242d7bb31114c5afc39a2cef586e73e73495a4832ac64d3
              • Instruction ID: 84770e956845c0365060e736447b21af40e330d35f677e2b5dd0b21c612320ed
              • Opcode Fuzzy Hash: 666e7131670ab6034242d7bb31114c5afc39a2cef586e73e73495a4832ac64d3
              • Instruction Fuzzy Hash: 63E15874628F488FCBA4DF78C4857AAB7E0FB58301F504A2EA59BC7245DF30A545CB89
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3374776077.0000000010950000.00000040.00000001.00040000.00000000.sdmp, Offset: 10950000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_10950000_explorer.jbxd
              Similarity
              • API ID:
              • String ID: Fiel$Subm$d$dPas$dUse$e$encr$encr$form$guid$itUR$name$rnam$swor$user$ypte$ypte
              • API String ID: 0-2916316912
              • Opcode ID: 1a4675aa69093f914decc08927043d33ef050167d1a45f8fb32d144d534e0ced
              • Instruction ID: f2bf8797aba256c0ffb2dfdbc999ab839e6dc69564d4d241c2199b5cea8186b7
              • Opcode Fuzzy Hash: 1a4675aa69093f914decc08927043d33ef050167d1a45f8fb32d144d534e0ced
              • Instruction Fuzzy Hash: 48B17D30518B488EDB65EF68C486AEEB7F1FF58300F50451EE49AC7251EF70A50ACB86
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3374776077.0000000010950000.00000040.00000001.00040000.00000000.sdmp, Offset: 10950000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_10950000_explorer.jbxd
              Similarity
              • API ID:
              • String ID: 2$c$d$d$d$e$i$l$l$l$n$n$p$s$t$u$w
              • API String ID: 0-1539916866
              • Opcode ID: e72b72cb0cc01a4fb435a8ab5948bc97e669459bbd1002971cdc116c820d8f81
              • Instruction ID: 92e18351adf8fe94776b94206aa323bd8d974c77d44fe0fccef841777d4ddbe6
              • Opcode Fuzzy Hash: e72b72cb0cc01a4fb435a8ab5948bc97e669459bbd1002971cdc116c820d8f81
              • Instruction Fuzzy Hash: E841D5B1A18B088FDF14DF88A4467BDBBE2FB88700F00425EE409D7245DB75AD498BD6
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3374776077.0000000010950000.00000040.00000001.00040000.00000000.sdmp, Offset: 10950000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_10950000_explorer.jbxd
              Similarity
              • API ID:
              • String ID: D$[$[$[$[$[$]$]$b$c$e$l$l$n
              • API String ID: 0-355182820
              • Opcode ID: 5b00ea5ff0ac38f91c5f3451741050e74e6bfffb06a4f81f7af14d2d93e98743
              • Instruction ID: 65b90b87aeee87b189ef23c45b16667e3f3ae755485e5dcaa18d6967158e96b1
              • Opcode Fuzzy Hash: 5b00ea5ff0ac38f91c5f3451741050e74e6bfffb06a4f81f7af14d2d93e98743
              • Instruction Fuzzy Hash: C0C15A75228B098FC758EF24C496AEAF3E1FB94304F40472EA59AC7210DF70A559CBC6
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3374776077.0000000010950000.00000040.00000001.00040000.00000000.sdmp, Offset: 10950000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_10950000_explorer.jbxd
              Similarity
              • API ID:
              • String ID: .$0$c$n$r$r$r$r$r$r$r$r
              • API String ID: 0-97273177
              • Opcode ID: c99d8b63ad26ee68af9772b0c2f17264c0bbc41cf5067afa0da8e01a5053a168
              • Instruction ID: a3062f458bccfd7eb262830d87413745ee47caa11487b437702facfd94cad77f
              • Opcode Fuzzy Hash: c99d8b63ad26ee68af9772b0c2f17264c0bbc41cf5067afa0da8e01a5053a168
              • Instruction Fuzzy Hash: AB51C5315287488FD749CF18D4812AAB7E5FB85700F501A2EF8CBC7241DBB4A90ACF82
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3374776077.0000000010950000.00000040.00000001.00040000.00000000.sdmp, Offset: 10950000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_10950000_explorer.jbxd
              Similarity
              • API ID:
              • String ID: 4.dl$cli.$dll$dragon_s.dll$l$nspr$opera_browser.dll$sspi
              • API String ID: 0-639201278
              • Opcode ID: 3bb0ec29e48dc84c2f9ecdcc79ab9852c4e3249089256f700559b0558053754d
              • Instruction ID: 8dd516276b70ce7517be4bbbee236440aa182d9ab90ce2cbbdf6d967b5b1b657
              • Opcode Fuzzy Hash: 3bb0ec29e48dc84c2f9ecdcc79ab9852c4e3249089256f700559b0558053754d
              • Instruction Fuzzy Hash: 22C18174618A198FC758EF68D496AEAF3E1FB94304F41432DA44AC7255DF30EA0ACBC5
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3374776077.0000000010950000.00000040.00000001.00040000.00000000.sdmp, Offset: 10950000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_10950000_explorer.jbxd
              Similarity
              • API ID:
              • String ID: 4.dl$cli.$dll$dragon_s.dll$l$nspr$opera_browser.dll$sspi
              • API String ID: 0-639201278
              • Opcode ID: f43930ec246ad51b32166c0bc4bf79f326171222225a5f9c9c86c27c8781e096
              • Instruction ID: 7d01e8c942df266f17ee30f450e22edaac845cabd03f4ff3916ccf601b898ffb
              • Opcode Fuzzy Hash: f43930ec246ad51b32166c0bc4bf79f326171222225a5f9c9c86c27c8781e096
              • Instruction Fuzzy Hash: 85C19174618A198FC758EF68D496AAAF3E1FB94304F41432DA44EC7255DF30EA0ACBC5
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3374776077.0000000010950000.00000040.00000001.00040000.00000000.sdmp, Offset: 10950000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_10950000_explorer.jbxd
              Similarity
              • API ID:
              • String ID: UR$2$L: $Pass$User$name$word
              • API String ID: 0-2058692283
              • Opcode ID: 192ee3367620c7562f2382bb65b9fc05a299a96abcb0fffb8f15ec5ae1331477
              • Instruction ID: b54a6082352da8e977fb9979440410b679ff092f45e1f71e2cdd95eff4519860
              • Opcode Fuzzy Hash: 192ee3367620c7562f2382bb65b9fc05a299a96abcb0fffb8f15ec5ae1331477
              • Instruction Fuzzy Hash: A0A1A1706187488FDB29EFA8D4457EEB7E1FF88300F40462DE48AD7291EF70954A8789
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3374776077.0000000010950000.00000040.00000001.00040000.00000000.sdmp, Offset: 10950000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_10950000_explorer.jbxd
              Similarity
              • API ID:
              • String ID: UR$2$L: $Pass$User$name$word
              • API String ID: 0-2058692283
              • Opcode ID: 811dc63e753d913bd80861ecf29671c0ec5da9e3b6d1a04c89c314a6a3ecac4a
              • Instruction ID: d60e7eb9570d00827b3e33e4f6af19cec0fd4019149144d85de008fcbf057bbb
              • Opcode Fuzzy Hash: 811dc63e753d913bd80861ecf29671c0ec5da9e3b6d1a04c89c314a6a3ecac4a
              • Instruction Fuzzy Hash: 079191706187488FDB28EFA8D445BEEB7E1FF98300F40462DE48AD7291EF70954A8785
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3374776077.0000000010950000.00000040.00000001.00040000.00000000.sdmp, Offset: 10950000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_10950000_explorer.jbxd
              Similarity
              • API ID:
              • String ID: $.$e$n$v
              • API String ID: 0-1849617553
              • Opcode ID: 88e172b8451cd2a9b002e6988e8bcb77ce4cb4dc6623ca34b6f08ddcd3f94e84
              • Instruction ID: 03df8d6171f3129bd20cb01499e670382bcdb7d2575a1a8c1bbab9dc675d7c36
              • Opcode Fuzzy Hash: 88e172b8451cd2a9b002e6988e8bcb77ce4cb4dc6623ca34b6f08ddcd3f94e84
              • Instruction Fuzzy Hash: E37193356187498FD758DFA8C4857AAB7F1FF58304F00062EE48AC7261EB71E94ACB85
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3374776077.0000000010950000.00000040.00000001.00040000.00000000.sdmp, Offset: 10950000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_10950000_explorer.jbxd
              Similarity
              • API ID:
              • String ID: 2.dl$dll$l32.$ole3$shel
              • API String ID: 0-1970020201
              • Opcode ID: b134dbd9f6717a83955f5285ab3b339b989e1d50f8699707141bdd3daa24f32e
              • Instruction ID: c14e1394bd2b49991996d287ea0c354ede26ea2248b75fd89e640a0cf052c122
              • Opcode Fuzzy Hash: b134dbd9f6717a83955f5285ab3b339b989e1d50f8699707141bdd3daa24f32e
              • Instruction Fuzzy Hash: 2F513BB0918B4C8FDB54DFA4C045AEEB7F1FF58301F404A2EA59AE7214EF70A5458B89
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3374776077.0000000010950000.00000040.00000001.00040000.00000000.sdmp, Offset: 10950000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_10950000_explorer.jbxd
              Similarity
              • API ID:
              • String ID: 4$\$dll$ion.$vers
              • API String ID: 0-1610437797
              • Opcode ID: 946c6b85a27e95b541945c97fc8955ce25e9cbbf861c78f5b4a7a89501b4aa4c
              • Instruction ID: f8b9c05c8848721748b32db4adf50fb00bab41bf4e36a643cc6fe030ad7687c4
              • Opcode Fuzzy Hash: 946c6b85a27e95b541945c97fc8955ce25e9cbbf861c78f5b4a7a89501b4aa4c
              • Instruction Fuzzy Hash: 76419534219B4C8FCBA5EF2498457EAB3E4FB98341F41462E994EC7244EF30E50987C2
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3374776077.0000000010950000.00000040.00000001.00040000.00000000.sdmp, Offset: 10950000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_10950000_explorer.jbxd
              Similarity
              • API ID:
              • String ID: 32.d$cli.$dll$sspi$user
              • API String ID: 0-327345718
              • Opcode ID: 4331b437e8e8c33b9d3042ca7a101e9875946b76dc224aa53cf86a4375d9541a
              • Instruction ID: 61a057ddf68a369312282a3007c14082e69badc43c94902cab0508ac5fe9842d
              • Opcode Fuzzy Hash: 4331b437e8e8c33b9d3042ca7a101e9875946b76dc224aa53cf86a4375d9541a
              • Instruction Fuzzy Hash: CE418071A18E0D8FCB94EF68C0957AD77E1FBA8300F41556AE80ED7200EA31D948CBC2
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3374776077.0000000010950000.00000040.00000001.00040000.00000000.sdmp, Offset: 10950000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_10950000_explorer.jbxd
              Similarity
              • API ID:
              • String ID: .dll$el32$h$kern
              • API String ID: 0-4264704552
              • Opcode ID: 9359c1e703a927bbfeba22f12881d3372b40fdd04c475320464a891c53438f4c
              • Instruction ID: 830d3b7918d30b0382510bae103513daa3126c4463272aca688e54b9c38801a9
              • Opcode Fuzzy Hash: 9359c1e703a927bbfeba22f12881d3372b40fdd04c475320464a891c53438f4c
              • Instruction Fuzzy Hash: C0418F70608B4D8FD7A9DF2980853AAB7E1FB98340F104B2E949FC3255DB70D949CB81
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3374776077.0000000010950000.00000040.00000001.00040000.00000000.sdmp, Offset: 10950000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_10950000_explorer.jbxd
              Similarity
              • API ID:
              • String ID: $Snif$f fr$om:
              • API String ID: 0-3434893486
              • Opcode ID: 09bcdfac33ec1e4ec0111ee2ca4a837fb2c377919df94419edd54a6c0362b305
              • Instruction ID: eb5faa0f9edaaee11c9179ee397d390483cdcf0fc65b2d205eb661891d89a660
              • Opcode Fuzzy Hash: 09bcdfac33ec1e4ec0111ee2ca4a837fb2c377919df94419edd54a6c0362b305
              • Instruction Fuzzy Hash: 4C31E27551CB886FD72ADB28C4856DABBD0FB94300F50492EE49BD7291EE30A54ECB43
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3374776077.0000000010950000.00000040.00000001.00040000.00000000.sdmp, Offset: 10950000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_10950000_explorer.jbxd
              Similarity
              • API ID:
              • String ID: $Snif$f fr$om:
              • API String ID: 0-3434893486
              • Opcode ID: 3ff11923ba7cb27a5852b7160a0339692380a5748f6322a3f9139bc862c068a3
              • Instruction ID: 48207915deb3e9c539bcc5967305b3fdb383a89f332c8d42b8f1468d94e17c0e
              • Opcode Fuzzy Hash: 3ff11923ba7cb27a5852b7160a0339692380a5748f6322a3f9139bc862c068a3
              • Instruction Fuzzy Hash: 3531F275508B486FD729DB28C485AEAB7D4FB94300F40492EE49BD3255EE30E54ACB43
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3374776077.0000000010950000.00000040.00000001.00040000.00000000.sdmp, Offset: 10950000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_10950000_explorer.jbxd
              Similarity
              • API ID:
              • String ID: .dll$chro$hild$me_c
              • API String ID: 0-3136806129
              • Opcode ID: b79a347c44b7e53efbef1ad5a08501038d02bf17702d136fbf8a30590be9006b
              • Instruction ID: 9183279bef6d9996c5ab50e41994f86b6caf8f421d956b931070cefcac335ae6
              • Opcode Fuzzy Hash: b79a347c44b7e53efbef1ad5a08501038d02bf17702d136fbf8a30590be9006b
              • Instruction Fuzzy Hash: 41318034218B088FC784EF289495BAAB7E1FFD8300F90462DA84ECB255DF30D909C792
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3374776077.0000000010950000.00000040.00000001.00040000.00000000.sdmp, Offset: 10950000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_10950000_explorer.jbxd
              Similarity
              • API ID:
              • String ID: .dll$chro$hild$me_c
              • API String ID: 0-3136806129
              • Opcode ID: 451ecfdc7a6dd194cc49c0618832622829ee31958d951160e0d103bd60c3dca9
              • Instruction ID: eb4ac32ac77a21d9c5566e62d71abc7bcfbe12cf2c0f297ff0e5b5c6ac96ea0d
              • Opcode Fuzzy Hash: 451ecfdc7a6dd194cc49c0618832622829ee31958d951160e0d103bd60c3dca9
              • Instruction Fuzzy Hash: 57318274218B088FC794EF689495BAAB7E1FFD8300F94463DA44ACB255DF30D909C792
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3374776077.0000000010950000.00000040.00000001.00040000.00000000.sdmp, Offset: 10950000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_10950000_explorer.jbxd
              Similarity
              • API ID:
              • String ID: User-Agent: $nt: $on.d$urlmon.dll
              • API String ID: 0-319646191
              • Opcode ID: fab8d4f3d63e7cb3a61fc22749300fb1f1c56e9464b264e147718cbb7a7b3fb5
              • Instruction ID: 03862425f62a150e78f4239a2bee8a566ca95089d6157ef7fa989e44c3eccb0c
              • Opcode Fuzzy Hash: fab8d4f3d63e7cb3a61fc22749300fb1f1c56e9464b264e147718cbb7a7b3fb5
              • Instruction Fuzzy Hash: 7A31DF31614A0C8FCB44EFA8C8857EEBBE0FB58204F40422AE44ED7240DF789649C789
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3374776077.0000000010950000.00000040.00000001.00040000.00000000.sdmp, Offset: 10950000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_10950000_explorer.jbxd
              Similarity
              • API ID:
              • String ID: User-Agent: $nt: $on.d$urlmon.dll
              • API String ID: 0-319646191
              • Opcode ID: 89ed80dc1d123a3fdb33b1283e784163d7980008e053a39b7e2b7c015d122c3c
              • Instruction ID: 784bc9ca07e71242fb71336c006e261b7555cbefc4ffed49ac3ca2b386b1dcd3
              • Opcode Fuzzy Hash: 89ed80dc1d123a3fdb33b1283e784163d7980008e053a39b7e2b7c015d122c3c
              • Instruction Fuzzy Hash: 2D21D071A14A4C8FCB04EFA8C8857EDBBE0FF58204F40422AE45AD7254DF749649CB89
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3374776077.0000000010950000.00000040.00000001.00040000.00000000.sdmp, Offset: 10950000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_10950000_explorer.jbxd
              Similarity
              • API ID:
              • String ID: .$l$l$t
              • API String ID: 0-168566397
              • Opcode ID: 4d2417001e92a941b72e22f5172d980f9cfaeeee068a4ce0a3e94531502ff258
              • Instruction ID: 5141f4a8e046d3d070af08bc4b0e18361d1b789be7aa56ee607ed50cd4d6682c
              • Opcode Fuzzy Hash: 4d2417001e92a941b72e22f5172d980f9cfaeeee068a4ce0a3e94531502ff258
              • Instruction Fuzzy Hash: 09215C74A24A0D9BDB54EFA8D0457EDBBF1FB58304F50462DE009D3600DB74A556CBC4
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3374776077.0000000010950000.00000040.00000001.00040000.00000000.sdmp, Offset: 10950000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_10950000_explorer.jbxd
              Similarity
              • API ID:
              • String ID: .$l$l$t
              • API String ID: 0-168566397
              • Opcode ID: bb135833945c650cdd1fe89d13a3bf36b2a9c2ee8a1cabd4608026fce5a35201
              • Instruction ID: 43fa61f881eec12d05adb5ac9c82c79119bc302bb2d5f9f5386186404c0b17da
              • Opcode Fuzzy Hash: bb135833945c650cdd1fe89d13a3bf36b2a9c2ee8a1cabd4608026fce5a35201
              • Instruction Fuzzy Hash: 66215C74A24A0D9FDB54EFA8D0457ADBAF1FB58304F50462EE009D3610DB74A595CB84
              Strings
              Memory Dump Source
              • Source File: 00000006.00000002.3374776077.0000000010950000.00000040.00000001.00040000.00000000.sdmp, Offset: 10950000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_10950000_explorer.jbxd
              Similarity
              • API ID:
              • String ID: auth$logi$pass$user
              • API String ID: 0-2393853802
              • Opcode ID: b1bb37e765f9f4b099c2fa6e409a2bcd00c7a79030895f352d0fc3307f2d087a
              • Instruction ID: 54a8150afe85072b35d89e174e9352ba8cd01484cf8f0d2d569f6372c20322d3
              • Opcode Fuzzy Hash: b1bb37e765f9f4b099c2fa6e409a2bcd00c7a79030895f352d0fc3307f2d087a
              • Instruction Fuzzy Hash: 2721CD30614B0D8BCB45EF9998916DEB7F1FF88344F004619E40AEB244D7B0E91A8BC2

              Execution Graph

              Execution Coverage:1.6%
              Dynamic/Decrypted Code Coverage:6.8%
              Signature Coverage:0%
              Total number of Nodes:622
              Total number of Limit Nodes:81
              execution_graph 106377 5232ad0 LdrInitializeThunk 106378 329f13d 106381 329b9d0 106378->106381 106382 329b9f6 106381->106382 106389 3289d40 106382->106389 106384 329ba02 106385 329ba26 106384->106385 106397 3288f30 106384->106397 106435 329a6b0 106385->106435 106390 3289d4d 106389->106390 106438 3289c90 106389->106438 106392 3289d54 106390->106392 106450 3289c30 106390->106450 106392->106384 106398 3288f57 106397->106398 106868 328b1c0 106398->106868 106400 3288f69 106872 328af10 106400->106872 106402 3288f86 106408 3288f8d 106402->106408 106943 328ae40 LdrLoadDll 106402->106943 106405 3288ffc 106888 328f410 106405->106888 106407 3289006 106409 329bf90 2 API calls 106407->106409 106431 32890f2 106407->106431 106408->106431 106876 328f380 106408->106876 106410 328902a 106409->106410 106411 329bf90 2 API calls 106410->106411 106412 328903b 106411->106412 106413 329bf90 2 API calls 106412->106413 106414 328904c 106413->106414 106900 328ca90 106414->106900 106416 3289059 106417 3294a50 8 API calls 106416->106417 106418 3289066 106417->106418 106419 3294a50 8 API calls 106418->106419 106420 3289077 106419->106420 106421 3289084 106420->106421 106422 32890a5 106420->106422 106910 328d620 106421->106910 106424 3294a50 8 API calls 106422->106424 106430 32890c1 106424->106430 106427 32890e9 106428 3288d00 23 API calls 106427->106428 106428->106431 106429 3289092 106926 3288d00 106429->106926 106430->106427 106944 328d6c0 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk 106430->106944 106431->106385 106436 329af60 LdrLoadDll 106435->106436 106437 329a6cf 106436->106437 106439 3289ca3 106438->106439 106489 3298bc0 LdrLoadDll 106438->106489 106469 3298a70 106439->106469 106442 3289cb6 106442->106390 106443 3289cac 106443->106442 106472 329b2b0 106443->106472 106445 3289cf3 106445->106442 106483 3289ab0 106445->106483 106447 3289d13 106490 3289620 LdrLoadDll 106447->106490 106449 3289d25 106449->106390 106451 3289c4a 106450->106451 106452 329b5a0 LdrLoadDll 106450->106452 106843 329b5a0 106451->106843 106452->106451 106455 329b5a0 LdrLoadDll 106456 3289c71 106455->106456 106457 328f180 106456->106457 106458 328f199 106457->106458 106851 328b040 106458->106851 106460 328f1ac 106855 329a1e0 106460->106855 106464 328f1d2 106467 328f1fd 106464->106467 106861 329a260 106464->106861 106466 329a490 2 API calls 106468 3289d65 106466->106468 106467->106466 106468->106384 106491 329a600 106469->106491 106473 329b2c9 106472->106473 106505 3294a50 106473->106505 106475 329b2e1 106476 329b2ea 106475->106476 106544 329b0f0 106475->106544 106476->106445 106478 329b2fe 106478->106476 106562 3299f00 106478->106562 106819 3287ea0 106483->106819 106485 3289ad1 106485->106447 106486 3289aca 106486->106485 106832 3288160 106486->106832 106489->106439 106490->106449 106492 329a616 106491->106492 106495 329af60 106492->106495 106494 3298a85 106494->106443 106496 329af70 106495->106496 106498 329af92 106495->106498 106499 3294e50 106496->106499 106498->106494 106500 3294e5e 106499->106500 106501 3294e6a 106499->106501 106500->106501 106504 32952d0 LdrLoadDll 106500->106504 106501->106498 106503 3294fbc 106503->106498 106504->106503 106506 3294d85 106505->106506 106507 3294a64 106505->106507 106506->106475 106507->106506 106571 3299c50 106507->106571 106510 3294b90 106574 329a360 106510->106574 106511 3294b73 106631 329a460 LdrLoadDll 106511->106631 106514 3294b7d 106514->106475 106515 3294bb7 106516 329bdc0 2 API calls 106515->106516 106518 3294bc3 106516->106518 106517 3294d49 106520 329a490 2 API calls 106517->106520 106518->106514 106518->106517 106519 3294d5f 106518->106519 106524 3294c52 106518->106524 106640 3294790 LdrLoadDll NtReadFile NtClose 106519->106640 106521 3294d50 106520->106521 106521->106475 106523 3294d72 106523->106475 106525 3294cb9 106524->106525 106527 3294c61 106524->106527 106525->106517 106526 3294ccc 106525->106526 106633 329a2e0 106526->106633 106529 3294c7a 106527->106529 106530 3294c66 106527->106530 106533 3294c7f 106529->106533 106534 3294c97 106529->106534 106632 3294650 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk 106530->106632 106577 32946f0 106533->106577 106534->106521 106589 3294410 106534->106589 106536 3294c70 106536->106475 106538 3294d2c 106637 329a490 106538->106637 106539 3294c8d 106539->106475 106542 3294caf 106542->106475 106543 3294d38 106543->106475 106545 329b101 106544->106545 106546 329b113 106545->106546 106658 329bd40 106545->106658 106546->106478 106548 329b134 106551 329b157 106548->106551 106661 3294070 106548->106661 106550 329b180 106550->106478 106551->106550 106552 3294070 3 API calls 106551->106552 106554 329b179 106552->106554 106554->106550 106693 3295390 106554->106693 106555 329b20a 106556 329b21a 106555->106556 106787 329af00 LdrLoadDll 106555->106787 106703 329ad70 106556->106703 106559 329b248 106782 3299ec0 106559->106782 106563 3299f0c 106562->106563 106564 329af60 LdrLoadDll 106563->106564 106565 3299f1c 106564->106565 106813 5232c0a 106565->106813 106566 3299f37 106568 329bdc0 106566->106568 106816 329a670 106568->106816 106570 329b359 106570->106445 106572 3294b44 106571->106572 106573 329af60 LdrLoadDll 106571->106573 106572->106510 106572->106511 106572->106514 106573->106572 106575 329af60 LdrLoadDll 106574->106575 106576 329a37c NtCreateFile 106575->106576 106576->106515 106578 329470c 106577->106578 106579 329472d 106578->106579 106580 329a2e0 LdrLoadDll 106578->106580 106581 3294748 106579->106581 106582 3294734 106579->106582 106580->106579 106584 329a490 2 API calls 106581->106584 106583 329a490 2 API calls 106582->106583 106586 329473d 106583->106586 106585 3294751 106584->106585 106641 329bfd0 LdrLoadDll RtlAllocateHeap 106585->106641 106586->106539 106588 329475c 106588->106539 106590 329445b 106589->106590 106591 329448e 106589->106591 106592 329a2e0 LdrLoadDll 106590->106592 106593 32945d9 106591->106593 106597 32944aa 106591->106597 106594 3294476 106592->106594 106595 329a2e0 LdrLoadDll 106593->106595 106596 329a490 2 API calls 106594->106596 106604 32945f4 106595->106604 106599 329447f 106596->106599 106598 329a2e0 LdrLoadDll 106597->106598 106600 32944c5 106598->106600 106599->106542 106602 32944cc 106600->106602 106603 32944e1 106600->106603 106606 329a490 2 API calls 106602->106606 106607 32944fc 106603->106607 106608 32944e6 106603->106608 106654 329a320 LdrLoadDll 106604->106654 106605 329462e 106609 329a490 2 API calls 106605->106609 106610 32944d5 106606->106610 106615 3294501 106607->106615 106642 329bf90 106607->106642 106611 329a490 2 API calls 106608->106611 106612 3294639 106609->106612 106610->106542 106613 32944ef 106611->106613 106612->106542 106613->106542 106618 3294513 106615->106618 106645 329a410 106615->106645 106617 3294567 106619 329457e 106617->106619 106653 329a2a0 LdrLoadDll 106617->106653 106618->106542 106621 329459a 106619->106621 106622 3294585 106619->106622 106624 329a490 2 API calls 106621->106624 106623 329a490 2 API calls 106622->106623 106623->106618 106625 32945a3 106624->106625 106626 32945cf 106625->106626 106648 329bb90 106625->106648 106626->106542 106628 32945ba 106629 329bdc0 2 API calls 106628->106629 106630 32945c3 106629->106630 106630->106542 106631->106514 106632->106536 106634 329af60 LdrLoadDll 106633->106634 106635 3294d14 106634->106635 106636 329a320 LdrLoadDll 106635->106636 106636->106538 106638 329af60 LdrLoadDll 106637->106638 106639 329a4ac NtClose 106638->106639 106639->106543 106640->106523 106641->106588 106644 329bfa8 106642->106644 106655 329a630 106642->106655 106644->106615 106646 329a42c NtReadFile 106645->106646 106647 329af60 LdrLoadDll 106645->106647 106646->106617 106647->106646 106649 329bb9d 106648->106649 106650 329bbb4 106648->106650 106649->106650 106651 329bf90 2 API calls 106649->106651 106650->106628 106652 329bbcb 106651->106652 106652->106628 106653->106619 106654->106605 106656 329af60 LdrLoadDll 106655->106656 106657 329a64c RtlAllocateHeap 106656->106657 106657->106644 106659 329bd6d 106658->106659 106788 329a540 106658->106788 106659->106548 106662 3294081 106661->106662 106663 3294089 106661->106663 106662->106551 106692 329435c 106663->106692 106791 329cf30 106663->106791 106665 32940dd 106666 329cf30 2 API calls 106665->106666 106668 32940e8 106666->106668 106667 3294136 106670 329cf30 2 API calls 106667->106670 106668->106667 106799 329cfd0 LdrLoadDll RtlAllocateHeap RtlFreeHeap 106668->106799 106800 329d060 106668->106800 106673 329414a 106670->106673 106672 32941a7 106674 329cf30 2 API calls 106672->106674 106673->106672 106676 329d060 3 API calls 106673->106676 106675 32941bd 106674->106675 106677 32941fa 106675->106677 106679 329d060 3 API calls 106675->106679 106676->106673 106678 329cf30 2 API calls 106677->106678 106680 3294205 106678->106680 106679->106675 106681 329d060 3 API calls 106680->106681 106687 329423f 106680->106687 106681->106680 106684 329cf90 2 API calls 106685 329433e 106684->106685 106686 329cf90 2 API calls 106685->106686 106688 3294348 106686->106688 106796 329cf90 106687->106796 106689 329cf90 2 API calls 106688->106689 106690 3294352 106689->106690 106691 329cf90 2 API calls 106690->106691 106691->106692 106692->106551 106694 32953a1 106693->106694 106695 3294a50 8 API calls 106694->106695 106697 32953b7 106695->106697 106696 329540a 106696->106555 106697->106696 106698 32953f2 106697->106698 106699 3295405 106697->106699 106701 329bdc0 2 API calls 106698->106701 106700 329bdc0 2 API calls 106699->106700 106700->106696 106702 32953f7 106701->106702 106702->106555 106704 329ad84 106703->106704 106705 329ac30 LdrLoadDll 106703->106705 106806 329ac30 106704->106806 106705->106704 106708 329ac30 LdrLoadDll 106709 329ad96 106708->106709 106710 329ac30 LdrLoadDll 106709->106710 106711 329ad9f 106710->106711 106712 329ac30 LdrLoadDll 106711->106712 106713 329ada8 106712->106713 106714 329ac30 LdrLoadDll 106713->106714 106715 329adb1 106714->106715 106716 329ac30 LdrLoadDll 106715->106716 106717 329adbd 106716->106717 106718 329ac30 LdrLoadDll 106717->106718 106719 329adc6 106718->106719 106720 329ac30 LdrLoadDll 106719->106720 106721 329adcf 106720->106721 106722 329ac30 LdrLoadDll 106721->106722 106723 329add8 106722->106723 106724 329ac30 LdrLoadDll 106723->106724 106725 329ade1 106724->106725 106726 329ac30 LdrLoadDll 106725->106726 106727 329adea 106726->106727 106728 329ac30 LdrLoadDll 106727->106728 106729 329adf6 106728->106729 106730 329ac30 LdrLoadDll 106729->106730 106731 329adff 106730->106731 106732 329ac30 LdrLoadDll 106731->106732 106733 329ae08 106732->106733 106734 329ac30 LdrLoadDll 106733->106734 106735 329ae11 106734->106735 106736 329ac30 LdrLoadDll 106735->106736 106737 329ae1a 106736->106737 106738 329ac30 LdrLoadDll 106737->106738 106739 329ae23 106738->106739 106740 329ac30 LdrLoadDll 106739->106740 106741 329ae2f 106740->106741 106742 329ac30 LdrLoadDll 106741->106742 106743 329ae38 106742->106743 106744 329ac30 LdrLoadDll 106743->106744 106745 329ae41 106744->106745 106746 329ac30 LdrLoadDll 106745->106746 106747 329ae4a 106746->106747 106748 329ac30 LdrLoadDll 106747->106748 106749 329ae53 106748->106749 106750 329ac30 LdrLoadDll 106749->106750 106751 329ae5c 106750->106751 106752 329ac30 LdrLoadDll 106751->106752 106753 329ae68 106752->106753 106754 329ac30 LdrLoadDll 106753->106754 106755 329ae71 106754->106755 106756 329ac30 LdrLoadDll 106755->106756 106757 329ae7a 106756->106757 106758 329ac30 LdrLoadDll 106757->106758 106759 329ae83 106758->106759 106760 329ac30 LdrLoadDll 106759->106760 106761 329ae8c 106760->106761 106762 329ac30 LdrLoadDll 106761->106762 106763 329ae95 106762->106763 106764 329ac30 LdrLoadDll 106763->106764 106765 329aea1 106764->106765 106766 329ac30 LdrLoadDll 106765->106766 106767 329aeaa 106766->106767 106768 329ac30 LdrLoadDll 106767->106768 106769 329aeb3 106768->106769 106770 329ac30 LdrLoadDll 106769->106770 106771 329aebc 106770->106771 106772 329ac30 LdrLoadDll 106771->106772 106773 329aec5 106772->106773 106774 329ac30 LdrLoadDll 106773->106774 106775 329aece 106774->106775 106776 329ac30 LdrLoadDll 106775->106776 106777 329aeda 106776->106777 106778 329ac30 LdrLoadDll 106777->106778 106779 329aee3 106778->106779 106780 329ac30 LdrLoadDll 106779->106780 106781 329aeec 106780->106781 106781->106559 106783 329af60 LdrLoadDll 106782->106783 106784 3299edc 106783->106784 106812 5232df0 LdrInitializeThunk 106784->106812 106785 3299ef3 106785->106478 106787->106556 106789 329af60 LdrLoadDll 106788->106789 106790 329a55c NtAllocateVirtualMemory 106789->106790 106790->106659 106792 329cf40 106791->106792 106793 329cf46 106791->106793 106792->106665 106794 329bf90 2 API calls 106793->106794 106795 329cf6c 106794->106795 106795->106665 106797 3294334 106796->106797 106798 329bdc0 2 API calls 106796->106798 106797->106684 106798->106797 106799->106668 106801 329cfd0 106800->106801 106802 329d02d 106801->106802 106803 329bf90 2 API calls 106801->106803 106802->106668 106804 329d00a 106803->106804 106805 329bdc0 2 API calls 106804->106805 106805->106802 106807 329ac4b 106806->106807 106808 3294e50 LdrLoadDll 106807->106808 106809 329ac6b 106808->106809 106810 3294e50 LdrLoadDll 106809->106810 106811 329ad17 106809->106811 106810->106811 106811->106708 106812->106785 106814 5232c11 106813->106814 106815 5232c1f LdrInitializeThunk 106813->106815 106814->106566 106815->106566 106817 329a68c RtlFreeHeap 106816->106817 106818 329af60 LdrLoadDll 106816->106818 106817->106570 106818->106817 106820 3287eab 106819->106820 106821 3287eb0 106819->106821 106820->106486 106822 329bd40 2 API calls 106821->106822 106825 3287ed5 106822->106825 106823 3287f38 106823->106486 106824 3299ec0 2 API calls 106824->106825 106825->106823 106825->106824 106826 3287f3e 106825->106826 106830 329bd40 2 API calls 106825->106830 106835 329a5c0 106825->106835 106828 3287f64 106826->106828 106829 329a5c0 2 API calls 106826->106829 106828->106486 106831 3287f55 106829->106831 106830->106825 106831->106486 106833 329a5c0 2 API calls 106832->106833 106834 328817e 106833->106834 106834->106447 106836 329a5dc 106835->106836 106837 329af60 LdrLoadDll 106835->106837 106842 5232c70 LdrInitializeThunk 106836->106842 106837->106836 106838 329a5f3 106838->106825 106839 329af60 LdrLoadDll 106838->106839 106840 329a61c 106839->106840 106840->106825 106842->106838 106844 329b5c3 106843->106844 106847 328acf0 106844->106847 106848 328ad14 106847->106848 106849 328ad50 LdrLoadDll 106848->106849 106850 3289c5b 106848->106850 106849->106850 106850->106455 106853 328b063 106851->106853 106852 328b0e0 106852->106460 106853->106852 106866 3299c90 LdrLoadDll 106853->106866 106856 329af60 LdrLoadDll 106855->106856 106857 328f1bb 106856->106857 106857->106468 106858 329a7d0 106857->106858 106859 329a7ef LookupPrivilegeValueW 106858->106859 106860 329af60 LdrLoadDll 106858->106860 106859->106464 106860->106859 106862 329af60 LdrLoadDll 106861->106862 106863 329a27c 106862->106863 106867 5232ea0 LdrInitializeThunk 106863->106867 106864 329a29b 106864->106467 106866->106852 106867->106864 106869 328b1f0 106868->106869 106870 328b040 LdrLoadDll 106869->106870 106871 328b204 106870->106871 106871->106400 106873 328af34 106872->106873 106945 3299c90 LdrLoadDll 106873->106945 106875 328af6e 106875->106402 106877 328f3ac 106876->106877 106878 328b1c0 LdrLoadDll 106877->106878 106879 328f3be 106878->106879 106946 328f290 106879->106946 106882 328f3d9 106885 328f3e4 106882->106885 106886 329a490 2 API calls 106882->106886 106883 328f3f1 106884 328f402 106883->106884 106887 329a490 2 API calls 106883->106887 106884->106405 106885->106405 106886->106885 106887->106884 106889 328f43c 106888->106889 106965 328b2b0 106889->106965 106891 328f44e 106892 328f290 3 API calls 106891->106892 106893 328f45f 106892->106893 106894 328f469 106893->106894 106895 328f481 106893->106895 106896 328f474 106894->106896 106898 329a490 2 API calls 106894->106898 106897 328f492 106895->106897 106899 329a490 2 API calls 106895->106899 106896->106407 106897->106407 106898->106896 106899->106897 106901 328caa6 106900->106901 106902 328cab0 106900->106902 106901->106416 106903 328af10 LdrLoadDll 106902->106903 106904 328cb4e 106903->106904 106905 328cb74 106904->106905 106906 328b040 LdrLoadDll 106904->106906 106905->106416 106907 328cb90 106906->106907 106908 3294a50 8 API calls 106907->106908 106909 328cbe5 106908->106909 106909->106416 106911 328d646 106910->106911 106912 328b040 LdrLoadDll 106911->106912 106913 328d65a 106912->106913 106969 328d310 106913->106969 106915 328908b 106916 328cc00 106915->106916 106917 328cc26 106916->106917 106918 328b040 LdrLoadDll 106917->106918 106919 328cca9 106917->106919 106918->106919 106920 328b040 LdrLoadDll 106919->106920 106921 328cd16 106920->106921 106922 328af10 LdrLoadDll 106921->106922 106923 328cd7f 106922->106923 106924 328b040 LdrLoadDll 106923->106924 106925 328ce2f 106924->106925 106925->106429 106998 328f6d0 106926->106998 106928 3288d14 106929 3288f25 106928->106929 107003 32943a0 106928->107003 106929->106385 106931 3288d70 106931->106929 107006 3288ab0 106931->107006 106934 329cf30 2 API calls 106935 3288db2 106934->106935 106936 329d060 3 API calls 106935->106936 106941 3288dc7 106936->106941 106937 3287ea0 4 API calls 106937->106941 106940 328c7b0 18 API calls 106940->106941 106941->106929 106941->106937 106941->106940 106942 3288160 2 API calls 106941->106942 107011 328f670 106941->107011 107015 328f080 21 API calls 106941->107015 106942->106941 106943->106408 106944->106427 106945->106875 106947 328f2aa 106946->106947 106955 328f360 106946->106955 106948 328b040 LdrLoadDll 106947->106948 106949 328f2cc 106948->106949 106956 3299f40 106949->106956 106951 328f30e 106959 3299f80 106951->106959 106954 329a490 2 API calls 106954->106955 106955->106882 106955->106883 106957 3299f5c 106956->106957 106958 329af60 LdrLoadDll 106956->106958 106957->106951 106958->106957 106960 3299f9c 106959->106960 106961 329af60 LdrLoadDll 106959->106961 106964 52335c0 LdrInitializeThunk 106960->106964 106961->106960 106962 328f354 106962->106954 106964->106962 106966 328b2d7 106965->106966 106967 328b040 LdrLoadDll 106966->106967 106968 328b313 106967->106968 106968->106891 106970 328d327 106969->106970 106978 328f710 106970->106978 106974 328d39b 106975 328d3a2 106974->106975 106989 329a2a0 LdrLoadDll 106974->106989 106975->106915 106977 328d3b5 106977->106915 106979 328f735 106978->106979 106990 32881a0 106979->106990 106981 328f759 106982 3294a50 8 API calls 106981->106982 106984 328d36f 106981->106984 106985 329bdc0 2 API calls 106981->106985 106997 328f550 LdrLoadDll CreateProcessInternalW LdrInitializeThunk 106981->106997 106982->106981 106986 329a6e0 106984->106986 106985->106981 106987 329af60 LdrLoadDll 106986->106987 106988 329a6ff CreateProcessInternalW 106987->106988 106988->106974 106989->106977 106991 328829f 106990->106991 106992 32881b5 106990->106992 106991->106981 106992->106991 106993 3294a50 8 API calls 106992->106993 106994 3288222 106993->106994 106995 329bdc0 2 API calls 106994->106995 106996 3288249 106994->106996 106995->106996 106996->106981 106997->106981 106999 3294e50 LdrLoadDll 106998->106999 107000 328f6ef 106999->107000 107001 328f6fd 107000->107001 107002 328f6f6 SetErrorMode 107000->107002 107001->106928 107002->107001 107016 328f4a0 107003->107016 107005 32943c6 107005->106931 107007 329bd40 2 API calls 107006->107007 107010 3288ad5 107006->107010 107007->107010 107008 3288cea 107008->106934 107010->107008 107035 3299880 107010->107035 107012 328f683 107011->107012 107083 3299e90 107012->107083 107015->106941 107017 328f4bd 107016->107017 107023 3299fc0 107017->107023 107020 328f505 107020->107005 107024 329af60 LdrLoadDll 107023->107024 107025 3299fdc 107024->107025 107033 5232f30 LdrInitializeThunk 107025->107033 107026 328f4fe 107026->107020 107028 329a010 107026->107028 107029 329af60 LdrLoadDll 107028->107029 107030 329a02c 107029->107030 107034 5232d10 LdrInitializeThunk 107030->107034 107031 328f52e 107031->107005 107033->107026 107034->107031 107036 329bf90 2 API calls 107035->107036 107037 3299897 107036->107037 107056 3289310 107037->107056 107039 32998b2 107040 32998d9 107039->107040 107041 32998f0 107039->107041 107042 329bdc0 2 API calls 107040->107042 107044 329bd40 2 API calls 107041->107044 107043 32998e6 107042->107043 107043->107008 107045 329992a 107044->107045 107046 329bd40 2 API calls 107045->107046 107047 3299943 107046->107047 107053 3299be4 107047->107053 107062 329bd80 LdrLoadDll 107047->107062 107049 3299bc9 107050 3299bd0 107049->107050 107049->107053 107051 329bdc0 2 API calls 107050->107051 107052 3299bda 107051->107052 107052->107008 107054 329bdc0 2 API calls 107053->107054 107055 3299c39 107054->107055 107055->107008 107057 3289335 107056->107057 107058 328acf0 LdrLoadDll 107057->107058 107059 3289368 107058->107059 107061 328938d 107059->107061 107063 328cf20 107059->107063 107061->107039 107062->107049 107064 328cf4c 107063->107064 107065 329a1e0 LdrLoadDll 107064->107065 107066 328cf65 107065->107066 107067 328cf6c 107066->107067 107074 329a220 107066->107074 107067->107061 107071 328cfa7 107072 329a490 2 API calls 107071->107072 107073 328cfca 107072->107073 107073->107061 107075 329af60 LdrLoadDll 107074->107075 107076 329a23c 107075->107076 107082 5232ca0 LdrInitializeThunk 107076->107082 107077 328cf8f 107077->107067 107079 329a810 107077->107079 107080 329a82f 107079->107080 107081 329af60 LdrLoadDll 107079->107081 107080->107071 107081->107080 107082->107077 107084 3299eac 107083->107084 107085 329af60 LdrLoadDll 107083->107085 107088 5232dd0 LdrInitializeThunk 107084->107088 107085->107084 107086 328f6ae 107086->106941 107088->107086 107089 50ccb84 107092 50ca042 107089->107092 107091 50ccba5 107093 50ca06b 107092->107093 107094 50ca182 NtQueryInformationProcess 107093->107094 107109 50ca56c 107093->107109 107096 50ca1ba 107094->107096 107095 50ca1ef 107095->107091 107096->107095 107097 50ca2db 107096->107097 107098 50ca290 107096->107098 107099 50ca2fc NtSuspendThread 107097->107099 107121 50c9de2 NtCreateSection NtMapViewOfSection NtClose 107098->107121 107101 50ca30d 107099->107101 107103 50ca331 107099->107103 107101->107091 107102 50ca2cf 107102->107091 107104 50ca412 107103->107104 107112 50c9bb2 107103->107112 107106 50ca531 107104->107106 107108 50ca4a6 NtSetContextThread 107104->107108 107107 50ca552 NtResumeThread 107106->107107 107107->107109 107111 50ca4bd 107108->107111 107109->107091 107110 50ca51c RtlQueueApcWow64Thread 107110->107106 107111->107106 107111->107110 107113 50c9bf7 107112->107113 107114 50c9c66 NtCreateSection 107113->107114 107115 50c9ca0 107114->107115 107117 50c9d4e 107114->107117 107116 50c9cc1 NtMapViewOfSection 107115->107116 107116->107117 107118 50c9d0c 107116->107118 107117->107104 107118->107117 107119 50c9d88 107118->107119 107120 50c9dc5 NtClose 107119->107120 107120->107104 107121->107102 107122 3299080 107123 329bd40 2 API calls 107122->107123 107125 32990bb 107122->107125 107123->107125 107124 329919c 107125->107124 107126 328acf0 LdrLoadDll 107125->107126 107127 32990f1 107126->107127 107128 3294e50 LdrLoadDll 107127->107128 107130 329910d 107128->107130 107129 3299120 Sleep 107129->107130 107130->107124 107130->107129 107133 3298ca0 LdrLoadDll 107130->107133 107134 3298eb0 LdrLoadDll 107130->107134 107133->107130 107134->107130

              Control-flow Graph

              APIs
              • NtQueryInformationProcess.NTDLL ref: 050CA19F
              Strings
              Memory Dump Source
              • Source File: 00000007.00000002.3357699325.00000000050C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_50c0000_colorcpl.jbxd
              Similarity
              • API ID: InformationProcessQuery
              • String ID: 0
              • API String ID: 1778838933-4108050209
              • Opcode ID: 7bc916a415ef614ffafa7f75d0ec115445e44d1b24a8fe03bb76e065ae57333e
              • Instruction ID: 0b64af8871edaafdd570c502ed209f543278314280699eb678b4a287dbf6d29d
              • Opcode Fuzzy Hash: 7bc916a415ef614ffafa7f75d0ec115445e44d1b24a8fe03bb76e065ae57333e
              • Instruction Fuzzy Hash: BBF11270A18A8C8FDBA5EF68D894AEE7BE0FB99304F40466ED44ED7250DF349541CB41

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 209 50c9baf-50c9bfe call 50c9102 212 50c9c0c-50c9c9a call 50cb942 * 2 NtCreateSection 209->212 213 50c9c00 209->213 219 50c9d5a-50c9d68 212->219 220 50c9ca0-50c9d0a call 50cb942 NtMapViewOfSection 212->220 214 50c9c02-50c9c0a 213->214 214->212 214->214 223 50c9d0c-50c9d4c 220->223 224 50c9d52 220->224 226 50c9d4e-50c9d4f 223->226 227 50c9d69-50c9d6b 223->227 224->219 226->224 228 50c9d6d-50c9d72 227->228 229 50c9d88-50c9ddc call 50ccd62 NtClose 227->229 230 50c9d74-50c9d86 call 50c9172 228->230 230->229
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000007.00000002.3357699325.00000000050C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_50c0000_colorcpl.jbxd
              Similarity
              • API ID: Section$CloseCreateView
              • String ID: @$@
              • API String ID: 1133238012-149943524
              • Opcode ID: db7dcd85dc853400a789dde9de35cb8114d6383d98fd4a16120e7ccab82aa783
              • Instruction ID: f43e69dd06910de4bc025038d7618cc56fd134b79e9b01d8ea963a489e118c7b
              • Opcode Fuzzy Hash: db7dcd85dc853400a789dde9de35cb8114d6383d98fd4a16120e7ccab82aa783
              • Instruction Fuzzy Hash: 8361617061CB488FCB58DF58D8856AEBBE0FB98314F50062EE58AD3651DF35E441CB86

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 268 50c9bb2-50c9bef 269 50c9bf7-50c9bfe 268->269 270 50c9bf2 call 50c9102 268->270 271 50c9c0c-50c9c9a call 50cb942 * 2 NtCreateSection 269->271 272 50c9c00 269->272 270->269 278 50c9d5a-50c9d68 271->278 279 50c9ca0-50c9d0a call 50cb942 NtMapViewOfSection 271->279 273 50c9c02-50c9c0a 272->273 273->271 273->273 282 50c9d0c-50c9d4c 279->282 283 50c9d52 279->283 285 50c9d4e-50c9d4f 282->285 286 50c9d69-50c9d6b 282->286 283->278 285->283 287 50c9d6d-50c9d72 286->287 288 50c9d88-50c9ddc call 50ccd62 NtClose 286->288 289 50c9d74-50c9d86 call 50c9172 287->289 289->288
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000007.00000002.3357699325.00000000050C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_50c0000_colorcpl.jbxd
              Similarity
              • API ID: Section$CreateView
              • String ID: @$@
              • API String ID: 1585966358-149943524
              • Opcode ID: d19581801156352ea8c1368f03ac477e7143ca4b49b2be0ea58d8e64d299f740
              • Instruction ID: 136e9415ed9f627e6ceef2dc2288c8e37a86845c36345e63b1ac3f86f5eeea50
              • Opcode Fuzzy Hash: d19581801156352ea8c1368f03ac477e7143ca4b49b2be0ea58d8e64d299f740
              • Instruction Fuzzy Hash: 30515F70618B088FD758DF18D895AAEBBE0FB98314F50062EE98AD3651DF35E441CB86

              Control-flow Graph

              APIs
              • NtQueryInformationProcess.NTDLL ref: 050CA19F
              Strings
              Memory Dump Source
              • Source File: 00000007.00000002.3357699325.00000000050C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_50c0000_colorcpl.jbxd
              Similarity
              • API ID: InformationProcessQuery
              • String ID: 0
              • API String ID: 1778838933-4108050209
              • Opcode ID: 4a13b2017a61ababd9bba988d9a9b5b8b8f576b3da72e298de5122239bed11ad
              • Instruction ID: 8d26d4cc97f801bbb8eae2ce50e2d596d9040c4bcdaf900b847e7e8f33be1ac2
              • Opcode Fuzzy Hash: 4a13b2017a61ababd9bba988d9a9b5b8b8f576b3da72e298de5122239bed11ad
              • Instruction Fuzzy Hash: 1A512C70918A8C8FDBA9EF68D8946EEBBF4FB99304F40462ED44AD7210DF309645CB41

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 548 329a35a-329a376 549 329a37c-329a3b1 NtCreateFile 548->549 550 329a377 call 329af60 548->550 550->549
              APIs
              • NtCreateFile.NTDLL(00000060,00000000,.z`,03294BB7,00000000,FFFFFFFF,?,?,FFFFFFFF,00000000,03294BB7,007A002E,00000000,00000060,00000000,00000000), ref: 0329A3AD
              Strings
              Memory Dump Source
              • Source File: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, Offset: 03280000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_3280000_colorcpl.jbxd
              Yara matches
              Similarity
              • API ID: CreateFile
              • String ID: .z`
              • API String ID: 823142352-1441809116
              • Opcode ID: 7c417f45352538f3dbc70b9006c8c35baf7fa9f0c61c4a99e0ec42fa983afd1d
              • Instruction ID: a06930695196af70a22799ac78e96dd46d052a6e6b2878679212f5560dbfe6b4
              • Opcode Fuzzy Hash: 7c417f45352538f3dbc70b9006c8c35baf7fa9f0c61c4a99e0ec42fa983afd1d
              • Instruction Fuzzy Hash: 6A01EFB2201208AFCB48CF88CC80EEB37E9AF8C754F158609FA0DD7240D630E8418BA0

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 551 329a360-329a3b1 call 329af60 NtCreateFile
              APIs
              • NtCreateFile.NTDLL(00000060,00000000,.z`,03294BB7,00000000,FFFFFFFF,?,?,FFFFFFFF,00000000,03294BB7,007A002E,00000000,00000060,00000000,00000000), ref: 0329A3AD
              Strings
              Memory Dump Source
              • Source File: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, Offset: 03280000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_3280000_colorcpl.jbxd
              Yara matches
              Similarity
              • API ID: CreateFile
              • String ID: .z`
              • API String ID: 823142352-1441809116
              • Opcode ID: 19fa48ade07888cfcca4191431b874d7c75bcaabbd4d52727e7364b5df5f6853
              • Instruction ID: a4518dce1e1eba7585f099ded6d4034bf95d04d514caf001dacc16ebe01535f5
              • Opcode Fuzzy Hash: 19fa48ade07888cfcca4191431b874d7c75bcaabbd4d52727e7364b5df5f6853
              • Instruction Fuzzy Hash: 63F0BDB2210208ABCB08CF88DC84EEB77ADAF8C754F158248BA0D97240C630E8518BA4
              APIs
              • NtReadFile.NTDLL(03294D72,5EB65239,FFFFFFFF,03294A31,?,?,03294D72,?,03294A31,FFFFFFFF,5EB65239,03294D72,?,00000000), ref: 0329A455
              Memory Dump Source
              • Source File: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, Offset: 03280000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_3280000_colorcpl.jbxd
              Yara matches
              Similarity
              • API ID: FileRead
              • String ID:
              • API String ID: 2738559852-0
              • Opcode ID: 1cb0ad745fa17a6b0f92d1251f92e59420b1dcb8c70dd00eb84f7822971f7938
              • Instruction ID: 1cc97f8d8f89f66292f364f1a28d5f13f756c6109196de7b088b78647c874d08
              • Opcode Fuzzy Hash: 1cb0ad745fa17a6b0f92d1251f92e59420b1dcb8c70dd00eb84f7822971f7938
              • Instruction Fuzzy Hash: 81F0A4B6210208ABDB14DF89DC80EEB77ADEF8C754F158249BA1D97245D630E8518BA0
              APIs
              • NtReadFile.NTDLL(03294D72,5EB65239,FFFFFFFF,03294A31,?,?,03294D72,?,03294A31,FFFFFFFF,5EB65239,03294D72,?,00000000), ref: 0329A455
              Memory Dump Source
              • Source File: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, Offset: 03280000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_3280000_colorcpl.jbxd
              Yara matches
              Similarity
              • API ID: FileRead
              • String ID:
              • API String ID: 2738559852-0
              • Opcode ID: 502a9b782b303b8a28e01c6a188142a589d386d33725d39a54a7567b0150e13c
              • Instruction ID: 88a34c965d29d5acae34962528785e4c1acce204771989a89cb7acc096849449
              • Opcode Fuzzy Hash: 502a9b782b303b8a28e01c6a188142a589d386d33725d39a54a7567b0150e13c
              • Instruction Fuzzy Hash: 78F067B6200109ABCB04CFA8D880CEB77ACFF8C314B15864EF91C97201C230E8518BA0
              APIs
              • NtAllocateVirtualMemory.NTDLL(00000004,00003000,00002000,00000000,?,03282D11,00002000,00003000,00000004), ref: 0329A579
              Memory Dump Source
              • Source File: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, Offset: 03280000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_3280000_colorcpl.jbxd
              Yara matches
              Similarity
              • API ID: AllocateMemoryVirtual
              • String ID:
              • API String ID: 2167126740-0
              • Opcode ID: e868ca870ba9ad3aee1a8e1804f154c56992d5df3b6804a08460a29a32ddb2bb
              • Instruction ID: d505f00ac83c6f0284518b9da83a94c743f41b45af0935b6f99d0f975a1e22d1
              • Opcode Fuzzy Hash: e868ca870ba9ad3aee1a8e1804f154c56992d5df3b6804a08460a29a32ddb2bb
              • Instruction Fuzzy Hash: 27F015B6210208ABDB14DF89CC80EAB77ADEF88654F118149BE0897241C630F810CBA0
              APIs
              • NtClose.NTDLL(03294D50,?,?,03294D50,00000000,FFFFFFFF), ref: 0329A4B5
              Memory Dump Source
              • Source File: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, Offset: 03280000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_3280000_colorcpl.jbxd
              Yara matches
              Similarity
              • API ID: Close
              • String ID:
              • API String ID: 3535843008-0
              • Opcode ID: aa41620b67aec822f8463caeb84bd84f714cc802f2fd34de09a1d76353dd2617
              • Instruction ID: bd258fa6dd5663300f779b051e17d133457e41f3296bac454ec1b4297338e4d4
              • Opcode Fuzzy Hash: aa41620b67aec822f8463caeb84bd84f714cc802f2fd34de09a1d76353dd2617
              • Instruction Fuzzy Hash: E6D012762003186BD710EB98CC45E97775CEF44650F154455BA185B241C570F50086E0
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.3357917667.00000000051C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 051C0000, based on PE: true
              • Associated: 00000007.00000002.3357917667.00000000052E9000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.00000000052ED000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.000000000535E000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_51c0000_colorcpl.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: 296caa9db9c14ce0b927523d5b2699c055b1b44f0ba9a1a2a483ffd1ac97e49b
              • Instruction ID: 4302f87a58ebc0df26c71c92187904d10383ab3f4df02db86f47c839382d8dc2
              • Opcode Fuzzy Hash: 296caa9db9c14ce0b927523d5b2699c055b1b44f0ba9a1a2a483ffd1ac97e49b
              • Instruction Fuzzy Hash: AA90022A23341002D1847158544860A00158BD1202FD5D415A1015558CC99589695721
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.3357917667.00000000051C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 051C0000, based on PE: true
              • Associated: 00000007.00000002.3357917667.00000000052E9000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.00000000052ED000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.000000000535E000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_51c0000_colorcpl.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: d67b29e68040d740393e64555d7a64166a2da63dc8b85a8feeb286c746bd8321
              • Instruction ID: 584190fe30289b8045570b4b5bbcd1a7ca030becaefd86df2e6a169b22722ee6
              • Opcode Fuzzy Hash: d67b29e68040d740393e64555d7a64166a2da63dc8b85a8feeb286c746bd8321
              • Instruction Fuzzy Hash: 0E90023222141413D1157158454470700198BD0241FD5C412A1424558D96D68A52A521
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.3357917667.00000000051C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 051C0000, based on PE: true
              • Associated: 00000007.00000002.3357917667.00000000052E9000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.00000000052ED000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.000000000535E000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_51c0000_colorcpl.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: 1ee756c15393ec4185da392e090057d8fa7f80c8b51a8f1ef94c7bb296f4ffde
              • Instruction ID: 8008e903f8143b393c3d10eeba8ef65fe290d708084082c13bfabbb244cc52b0
              • Opcode Fuzzy Hash: 1ee756c15393ec4185da392e090057d8fa7f80c8b51a8f1ef94c7bb296f4ffde
              • Instruction Fuzzy Hash: A0900222262451525549B158444450740169BE02417D5C012A2414950C85A69956DA21
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.3357917667.00000000051C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 051C0000, based on PE: true
              • Associated: 00000007.00000002.3357917667.00000000052E9000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.00000000052ED000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.000000000535E000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_51c0000_colorcpl.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: 0bba0273b94ab52de4e7ec5f8aea95fbba88d3879f8f7362943c286a41d6bee7
              • Instruction ID: 0351d6bdf1531f089f64bc7fb86424df6828d3951a0d209b40829396d5a42bf1
              • Opcode Fuzzy Hash: 0bba0273b94ab52de4e7ec5f8aea95fbba88d3879f8f7362943c286a41d6bee7
              • Instruction Fuzzy Hash: 9490023222141842D10471584444B4600158BE0301F95C016A1124654D8695C9517921
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.3357917667.00000000051C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 051C0000, based on PE: true
              • Associated: 00000007.00000002.3357917667.00000000052E9000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.00000000052ED000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.000000000535E000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_51c0000_colorcpl.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: 56f44e7fe8bdca4d9072dc642286e2f473877f9a64aa67845d65ec79501c1cad
              • Instruction ID: 78fa49d57875ea32cd48eecffb87355e31b9c08a1462200dfb9a6726efc0e13f
              • Opcode Fuzzy Hash: 56f44e7fe8bdca4d9072dc642286e2f473877f9a64aa67845d65ec79501c1cad
              • Instruction Fuzzy Hash: BC90023222149802D1147158844474A00158BD0301F99C411A5424658D86D589917521
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.3357917667.00000000051C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 051C0000, based on PE: true
              • Associated: 00000007.00000002.3357917667.00000000052E9000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.00000000052ED000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.000000000535E000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_51c0000_colorcpl.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: 6f665017b5defc5a66c5cd53a62d519476af5931c6e64c80b9e9acf44fe4ef61
              • Instruction ID: d8e04adcef724dddcffd7dddfe8e181d536536bad7596c9bc625fa136e69fbd1
              • Opcode Fuzzy Hash: 6f665017b5defc5a66c5cd53a62d519476af5931c6e64c80b9e9acf44fe4ef61
              • Instruction Fuzzy Hash: 3090023222141402D1047598544864600158BE0301F95D011A6024555EC6E589916531
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.3357917667.00000000051C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 051C0000, based on PE: true
              • Associated: 00000007.00000002.3357917667.00000000052E9000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.00000000052ED000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.000000000535E000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_51c0000_colorcpl.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: 24c1f4f0813b396b2a0f29b757d3cc67b50c18a97accd5bb973e45ddb1ab34fa
              • Instruction ID: c60704f0016d840ff75021d26f8bce819ad733f0a0e8be37753e76952bd632c8
              • Opcode Fuzzy Hash: 24c1f4f0813b396b2a0f29b757d3cc67b50c18a97accd5bb973e45ddb1ab34fa
              • Instruction Fuzzy Hash: 2E90026236141442D10471584454B060015CBE1301F95C015E2064554D8699CD526526
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.3357917667.00000000051C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 051C0000, based on PE: true
              • Associated: 00000007.00000002.3357917667.00000000052E9000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.00000000052ED000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.000000000535E000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_51c0000_colorcpl.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: 4478f275df577f01a5a319ca70c367fd569981b7f7681a8e0fae55ec454bedec
              • Instruction ID: 79856831c524f6430a384a90aeee256a6e1905419e05374c84c30e804de84022
              • Opcode Fuzzy Hash: 4478f275df577f01a5a319ca70c367fd569981b7f7681a8e0fae55ec454bedec
              • Instruction Fuzzy Hash: BC900222231C1042D20475684C54B0700158BD0303F95C115A1154554CC99589615921
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.3357917667.00000000051C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 051C0000, based on PE: true
              • Associated: 00000007.00000002.3357917667.00000000052E9000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.00000000052ED000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.000000000535E000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_51c0000_colorcpl.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: e82f67889b060b579d3301bf8189d6e04f17d1d1a5512f18abb615c62ca155ca
              • Instruction ID: e34a6318d95789c3fb168e9de6a3fcc8e567ff827a1f0db9ecfc7e4fa9a5a52a
              • Opcode Fuzzy Hash: e82f67889b060b579d3301bf8189d6e04f17d1d1a5512f18abb615c62ca155ca
              • Instruction Fuzzy Hash: C790027222141402D1447158444474600158BD0301F95C011A6064554E86D98ED56A65
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.3357917667.00000000051C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 051C0000, based on PE: true
              • Associated: 00000007.00000002.3357917667.00000000052E9000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.00000000052ED000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.000000000535E000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_51c0000_colorcpl.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: 8ebf8dedb35e7944a7465ef1675395091db97289faef8bc33cc4cb0eb8dd5032
              • Instruction ID: 851f1996aefc9d48660b37a2922dfc1b5fdd5c31be1afe23805d303e25eea9dd
              • Opcode Fuzzy Hash: 8ebf8dedb35e7944a7465ef1675395091db97289faef8bc33cc4cb0eb8dd5032
              • Instruction Fuzzy Hash: 2090026222241003410971584454616401A8BE0201B95C021E2014590DC5A589916525
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.3357917667.00000000051C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 051C0000, based on PE: true
              • Associated: 00000007.00000002.3357917667.00000000052E9000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.00000000052ED000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.000000000535E000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_51c0000_colorcpl.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: eb2beafacef9ef9f48aa280f831a1a2475a8a4f84bd17b81fc72c186299dda6b
              • Instruction ID: 2a86ab64671b2109148e8e65b54860465d3a0c6a28b1746752bdbbc709405d25
              • Opcode Fuzzy Hash: eb2beafacef9ef9f48aa280f831a1a2475a8a4f84bd17b81fc72c186299dda6b
              • Instruction Fuzzy Hash: 2590023222545842D14471584444A4600258BD0305F95C011A1064694D96A58E55BA61
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.3357917667.00000000051C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 051C0000, based on PE: true
              • Associated: 00000007.00000002.3357917667.00000000052E9000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.00000000052ED000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.000000000535E000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_51c0000_colorcpl.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: 4c66ff83ac1155c6af6f1cb4f417bfab1b4b18359a43210677e3ab4768b770cb
              • Instruction ID: 4cb678d9ec68ef4cd23429a4d717ca088b60ecde58c7e2ffc2f5b9a6b49bc31c
              • Opcode Fuzzy Hash: 4c66ff83ac1155c6af6f1cb4f417bfab1b4b18359a43210677e3ab4768b770cb
              • Instruction Fuzzy Hash: 5990023222141802D1847158444464A00158BD1301FD5C015A1025654DCA958B597BA1
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.3357917667.00000000051C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 051C0000, based on PE: true
              • Associated: 00000007.00000002.3357917667.00000000052E9000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.00000000052ED000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.000000000535E000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_51c0000_colorcpl.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: 46aaacf3e1f2b3f13b6e84c2402592c08df5daaa07c6ab6fbd3adf3e8fe1f71b
              • Instruction ID: a4e99d6bd9ff5596fe83cc84cc664f19cad89dc3ded3a0ff7c20b4581eee6d41
              • Opcode Fuzzy Hash: 46aaacf3e1f2b3f13b6e84c2402592c08df5daaa07c6ab6fbd3adf3e8fe1f71b
              • Instruction Fuzzy Hash: 63900226231410030109B558074450700568BD5351395C021F2015550CD6A189615521
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.3357917667.00000000051C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 051C0000, based on PE: true
              • Associated: 00000007.00000002.3357917667.00000000052E9000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.00000000052ED000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.000000000535E000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_51c0000_colorcpl.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: f25fc3c54f4dcfaaebcffcc13dd736a7689d7eaf245bbeb0411758bfc4de8300
              • Instruction ID: fc077a0ce4d52ee53cfa99a604f53bbe044e1ec80deda29d39da54c83bb6e7a7
              • Opcode Fuzzy Hash: f25fc3c54f4dcfaaebcffcc13dd736a7689d7eaf245bbeb0411758bfc4de8300
              • Instruction Fuzzy Hash: 8090023262551402D1047158455470610158BD0201FA5C411A1424568D87D58A5169A2

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 405 3299080-32990af 406 32990bb-32990c2 405->406 407 32990b6 call 329bd40 405->407 408 32990c8-3299118 call 329be10 call 328acf0 call 3294e50 406->408 409 329919c-32991a2 406->409 407->406 416 3299120-3299131 Sleep 408->416 417 3299133-3299139 416->417 418 3299196-329919a 416->418 419 329913b-3299161 call 3298ca0 417->419 420 3299163-3299183 417->420 418->409 418->416 422 3299189-329918c 419->422 420->422 423 3299184 call 3298eb0 420->423 422->418 423->422
              APIs
              • Sleep.KERNELBASE(000007D0), ref: 03299128
              Strings
              Memory Dump Source
              • Source File: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, Offset: 03280000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_3280000_colorcpl.jbxd
              Yara matches
              Similarity
              • API ID: Sleep
              • String ID: net.dll$wininet.dll
              • API String ID: 3472027048-1269752229
              • Opcode ID: a4826623e7868b6d09aa693b87d54e3f9d130cbf8debe4ac90b6fe1b62c8f438
              • Instruction ID: 719c22a661058b855e584704c56637d8a2f5095f147f5ebd1a375b7f489467cc
              • Opcode Fuzzy Hash: a4826623e7868b6d09aa693b87d54e3f9d130cbf8debe4ac90b6fe1b62c8f438
              • Instruction Fuzzy Hash: 4631A1B6500345ABDB18DF64D885F67B7B8BB48B00F04801EF62E5B244D770A590CBA4

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 425 3299076-32990c2 call 329bd40 428 32990c8-3299118 call 329be10 call 328acf0 call 3294e50 425->428 429 329919c-32991a2 425->429 436 3299120-3299131 Sleep 428->436 437 3299133-3299139 436->437 438 3299196-329919a 436->438 439 329913b-3299161 call 3298ca0 437->439 440 3299163-3299183 437->440 438->429 438->436 442 3299189-329918c 439->442 440->442 443 3299184 call 3298eb0 440->443 442->438 443->442
              APIs
              • Sleep.KERNELBASE(000007D0), ref: 03299128
              Strings
              Memory Dump Source
              • Source File: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, Offset: 03280000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_3280000_colorcpl.jbxd
              Yara matches
              Similarity
              • API ID: Sleep
              • String ID: net.dll$wininet.dll
              • API String ID: 3472027048-1269752229
              • Opcode ID: 3303cf2d7ae34a60da9932287dbf4d8a4abee8dad8b5115c484271d44e3ec96c
              • Instruction ID: b2281e33a8bfb9daa5f66dec99199632e7f07d723481836859999dc2556fe0fe
              • Opcode Fuzzy Hash: 3303cf2d7ae34a60da9932287dbf4d8a4abee8dad8b5115c484271d44e3ec96c
              • Instruction Fuzzy Hash: 8021D275900305ABDB14DF64D885B6BB7B8FB48B00F14801EE62D5B285D7B0A590CBA4

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 554 329a662-329a687 call 329af60 556 329a68c-329a6a1 RtlFreeHeap 554->556
              APIs
              • RtlFreeHeap.NTDLL(00000060,00000000,.z`,007A002E,00000000,00000060,00000000,00000000,?,?,00700069,?,03283AF8), ref: 0329A69D
              Strings
              Memory Dump Source
              • Source File: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, Offset: 03280000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_3280000_colorcpl.jbxd
              Yara matches
              Similarity
              • API ID: FreeHeap
              • String ID: .z`
              • API String ID: 3298025750-1441809116
              • Opcode ID: 3b169a03a4d6d4869557df61860f443006a029f9ed7622e83cbd9cf270615e2b
              • Instruction ID: bb9db3d369589b8c65ca45a2716d50f1f99b4de892e55a334aed2d91c821de3b
              • Opcode Fuzzy Hash: 3b169a03a4d6d4869557df61860f443006a029f9ed7622e83cbd9cf270615e2b
              • Instruction Fuzzy Hash: 13E068A91043850FDB00EE79949049F37D4FF80214720865BEC584B30BD021C44A8761

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 557 329a670-329a686 558 329a68c-329a6a1 RtlFreeHeap 557->558 559 329a687 call 329af60 557->559 559->558
              APIs
              • RtlFreeHeap.NTDLL(00000060,00000000,.z`,007A002E,00000000,00000060,00000000,00000000,?,?,00700069,?,03283AF8), ref: 0329A69D
              Strings
              Memory Dump Source
              • Source File: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, Offset: 03280000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_3280000_colorcpl.jbxd
              Yara matches
              Similarity
              • API ID: FreeHeap
              • String ID: .z`
              • API String ID: 3298025750-1441809116
              • Opcode ID: 540c4433df045b48126259b9153db85e530e9dd1f040c1eb84158749b6bc4ef9
              • Instruction ID: 4705eee8507f07ebdcf1c00212e00a6948b08b9f88e3a5a7381613d212f46b7e
              • Opcode Fuzzy Hash: 540c4433df045b48126259b9153db85e530e9dd1f040c1eb84158749b6bc4ef9
              • Instruction Fuzzy Hash: F5E046B6210308ABDB18EF99CC48EA777ACEF88750F118559FE085B241C631F910CAF0

              Control-flow Graph

              APIs
              • PostThreadMessageW.USER32(0065002E,00000111,00000000,00000000,00000000), ref: 0328836A
              • PostThreadMessageW.USER32(0065002E,00008003,00000000,?,00000000), ref: 0328838B
              Memory Dump Source
              • Source File: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, Offset: 03280000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_3280000_colorcpl.jbxd
              Yara matches
              Similarity
              • API ID: MessagePostThread
              • String ID:
              • API String ID: 1836367815-0
              • Opcode ID: a493eabf7697513180435b5f665ed638a4e8f6b3857f93d23393bef0d0da5e70
              • Instruction ID: 6105883e2f3e01a5a8921493c8470891a7347885d3c4819d360c92019ebcb7dc
              • Opcode Fuzzy Hash: a493eabf7697513180435b5f665ed638a4e8f6b3857f93d23393bef0d0da5e70
              • Instruction Fuzzy Hash: 1101D431A913287AEB20FA949C02FBE772C5B00F50F040115FF04BE1C1EAD4694642E5
              APIs
              • LdrLoadDll.NTDLL(00000000,00000000,00000003,?), ref: 0328AD62
              Memory Dump Source
              • Source File: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, Offset: 03280000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_3280000_colorcpl.jbxd
              Yara matches
              Similarity
              • API ID: Load
              • String ID:
              • API String ID: 2234796835-0
              • Opcode ID: dc2098e385e942efcd48a296202403441f5905bb34daa24398974f8d6af8945c
              • Instruction ID: 7a1c261c020e603c6ba58d68f206fd66912b4ba99254c6be8f168d5023bb82f7
              • Opcode Fuzzy Hash: dc2098e385e942efcd48a296202403441f5905bb34daa24398974f8d6af8945c
              • Instruction Fuzzy Hash: 8E015EB9D1020EABEF10EBA4DD41F9DB3789B04608F0445A6A9089B281FA70E7548B91
              APIs
              • LookupPrivilegeValueW.ADVAPI32(00000000,?,0328F1D2,0328F1D2,?,00000000,?,?), ref: 0329A800
              Memory Dump Source
              • Source File: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, Offset: 03280000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_3280000_colorcpl.jbxd
              Yara matches
              Similarity
              • API ID: LookupPrivilegeValue
              • String ID:
              • API String ID: 3899507212-0
              • Opcode ID: a74d6b44c497589037dee59f5b64dfe1477963b6447a0ab723df86f9e3b050e7
              • Instruction ID: c7c815a602300bf1758e18961f5ae12d9c611d2ed65d9771065b68aa8ec3beca
              • Opcode Fuzzy Hash: a74d6b44c497589037dee59f5b64dfe1477963b6447a0ab723df86f9e3b050e7
              • Instruction Fuzzy Hash: 10F049B62002197FEB14DFA9DC84EEB77A9EF88250F108519F90CD7281C631E9118BB4
              APIs
              • CreateProcessInternalW.KERNELBASE(?,00000000,?,?,00000000,00000000,?,?,?,00000000,00000000,?,?,00000000,?,00000000), ref: 0329A734
              Memory Dump Source
              • Source File: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, Offset: 03280000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_3280000_colorcpl.jbxd
              Yara matches
              Similarity
              • API ID: CreateInternalProcess
              • String ID:
              • API String ID: 2186235152-0
              • Opcode ID: 91c10d5b09b6f5ff7ee6d1e22534128eefdcfa4a5b7191d55d386dbf4554461c
              • Instruction ID: be0f08385962161ea85648c4957dacd031c1655b89dff80e0fc428d25076a067
              • Opcode Fuzzy Hash: 91c10d5b09b6f5ff7ee6d1e22534128eefdcfa4a5b7191d55d386dbf4554461c
              • Instruction Fuzzy Hash: 5901AFB2210208ABCB54DF89DC80EEB77ADAF8C754F158258BA0D97244C630E851CBA4
              APIs
              • CreateThread.KERNELBASE(00000000,00000000,-00000002,?,00000000,00000000,?,?,0328F050,?,?,00000000), ref: 032991EC
              Memory Dump Source
              • Source File: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, Offset: 03280000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_3280000_colorcpl.jbxd
              Yara matches
              Similarity
              • API ID: CreateThread
              • String ID:
              • API String ID: 2422867632-0
              • Opcode ID: d8d341beacf55d3aadfcb46bdd6eb0ebc06c290d7a953d7ae1546744555f20b2
              • Instruction ID: 319f079326d1bc3882b592fbc310950c8499ab5855249c47d5ab2d62ec93fa91
              • Opcode Fuzzy Hash: d8d341beacf55d3aadfcb46bdd6eb0ebc06c290d7a953d7ae1546744555f20b2
              • Instruction Fuzzy Hash: 90E06D373903043AEB20A599AC02FA7B29CDB81B21F15002AFA4DEA2C0D995F84142A4
              APIs
              • LookupPrivilegeValueW.ADVAPI32(00000000,?,0328F1D2,0328F1D2,?,00000000,?,?), ref: 0329A800
              Memory Dump Source
              • Source File: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, Offset: 03280000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_3280000_colorcpl.jbxd
              Yara matches
              Similarity
              • API ID: LookupPrivilegeValue
              • String ID:
              • API String ID: 3899507212-0
              • Opcode ID: c524c4dcdeb286be68a002add1a356f71d86b8c938967e6280f3f61150ebef6a
              • Instruction ID: e4a2c31beef593fe077476846be0674f2c75e179b8ebfe065b3b8c22ad02a675
              • Opcode Fuzzy Hash: c524c4dcdeb286be68a002add1a356f71d86b8c938967e6280f3f61150ebef6a
              • Instruction Fuzzy Hash: 77E01AB52003086BDB10DF49CC84EE737ADEF88650F118155BA085B241C931E8108BF5
              APIs
              • RtlAllocateHeap.NTDLL(03294536,?,03294CAF,03294CAF,?,03294536,?,?,?,?,?,00000000,00000000,?), ref: 0329A65D
              Memory Dump Source
              • Source File: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, Offset: 03280000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_3280000_colorcpl.jbxd
              Yara matches
              Similarity
              • API ID: AllocateHeap
              • String ID:
              • API String ID: 1279760036-0
              • Opcode ID: ecb7fbf7fbf697e7ed6b19bb654fc0845e00bd12648aab82589a03cf581b1705
              • Instruction ID: 7cc6542c188e21d9659a910a91c4efb5508584d2c35197dfd7c01b37e99a80ba
              • Opcode Fuzzy Hash: ecb7fbf7fbf697e7ed6b19bb654fc0845e00bd12648aab82589a03cf581b1705
              • Instruction Fuzzy Hash: EAE046B6210308ABDB14EF99CC40EA777ACEF88654F118559FE085B241C631F910CBF0
              APIs
              • SetErrorMode.KERNELBASE(00008003,?,03288D14,?), ref: 0328F6FB
              Memory Dump Source
              • Source File: 00000007.00000002.3346916231.0000000003280000.00000040.80000000.00040000.00000000.sdmp, Offset: 03280000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_3280000_colorcpl.jbxd
              Yara matches
              Similarity
              • API ID: ErrorMode
              • String ID:
              • API String ID: 2340568224-0
              • Opcode ID: 2932bcf02bc07d7163de81b169680dc5c005ffd35bbbe1c0c8f45c66faab01c4
              • Instruction ID: f172013721d8358cf32d8d1a89ed4a7a2e7ffe34b7ba1da5fe8791cced40820b
              • Opcode Fuzzy Hash: 2932bcf02bc07d7163de81b169680dc5c005ffd35bbbe1c0c8f45c66faab01c4
              • Instruction Fuzzy Hash: 69D05E656603093AEA10FEA59C02F2673889B45A04F4A0064F9489A2C3D990E4014165
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.3357917667.00000000051C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 051C0000, based on PE: true
              • Associated: 00000007.00000002.3357917667.00000000052E9000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.00000000052ED000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.000000000535E000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_51c0000_colorcpl.jbxd
              Similarity
              • API ID: InitializeThunk
              • String ID:
              • API String ID: 2994545307-0
              • Opcode ID: 1da3136e0d1bc11adf47541e3c3089230b59b0a9ea0655ec61c98326b3de72bb
              • Instruction ID: 47324ab27c78c5555b57896e2e4a6ce7ddfe3e21be942a6908cfc1f513792a09
              • Opcode Fuzzy Hash: 1da3136e0d1bc11adf47541e3c3089230b59b0a9ea0655ec61c98326b3de72bb
              • Instruction Fuzzy Hash: 3EB09B739115D5C5DB15F7604609B1779117FD0701F56C461D3070642F4778D1D1E575
              APIs
              • GetSystemTimeAsFileTime.KERNEL32(00000000), ref: 008F19A2
              • GetCurrentProcessId.KERNEL32 ref: 008F19B1
              • GetCurrentThreadId.KERNEL32 ref: 008F19BA
              • GetTickCount.KERNEL32 ref: 008F19C3
              • QueryPerformanceCounter.KERNEL32(?), ref: 008F19D8
              Memory Dump Source
              • Source File: 00000007.00000002.3346631053.00000000008F0000.00000040.80000000.00040000.00000000.sdmp, Offset: 008F0000, based on PE: true
              • Associated: 00000007.00000002.3346631053.00000000008F3000.00000040.80000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_8f0000_colorcpl.jbxd
              Similarity
              • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
              • String ID:
              • API String ID: 1445889803-0
              • Opcode ID: 755b8c41888ddb81abbfe12d58932b59423f39f067f539b2b0760fcad848c2e3
              • Instruction ID: 0b6b7d0a575ddaea3ef7567b661ebe01e39d495e00ed28efb86ccb4983c0ac10
              • Opcode Fuzzy Hash: 755b8c41888ddb81abbfe12d58932b59423f39f067f539b2b0760fcad848c2e3
              • Instruction Fuzzy Hash: 4C11FE75E11608EBDF14DBB8D948AAEBBF4FF98311F514856D501E7214EB309B00DB54
              APIs
              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,008F1BF9,008F1000), ref: 008F1ACA
              • UnhandledExceptionFilter.KERNEL32(008F1BF9,?,008F1BF9,008F1000), ref: 008F1AD3
              • GetCurrentProcess.KERNEL32(C0000409,?,008F1BF9,008F1000), ref: 008F1ADE
              • TerminateProcess.KERNEL32(00000000,?,008F1BF9,008F1000), ref: 008F1AE5
              Memory Dump Source
              • Source File: 00000007.00000002.3346631053.00000000008F0000.00000040.80000000.00040000.00000000.sdmp, Offset: 008F0000, based on PE: true
              • Associated: 00000007.00000002.3346631053.00000000008F3000.00000040.80000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_8f0000_colorcpl.jbxd
              Similarity
              • API ID: ExceptionFilterProcessUnhandled$CurrentTerminate
              • String ID:
              • API String ID: 3231755760-0
              • Opcode ID: 59a3b37698afc56d5434d4e29410d7762dcb003c2a9fafef395f08f9cd5acb44
              • Instruction ID: db90a5c5aedd642234529f38722ed7f5ac04270c241a7cf93149a9a1c45427f5
              • Opcode Fuzzy Hash: 59a3b37698afc56d5434d4e29410d7762dcb003c2a9fafef395f08f9cd5acb44
              • Instruction Fuzzy Hash: 28D012B2000A08BBCB002BF2EE0CE697F28FBC8352F040002F30E82020CF319A01CB69
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000007.00000002.3357917667.00000000051C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 051C0000, based on PE: true
              • Associated: 00000007.00000002.3357917667.00000000052E9000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.00000000052ED000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.000000000535E000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_51c0000_colorcpl.jbxd
              Similarity
              • API ID: ___swprintf_l
              • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
              • API String ID: 48624451-2108815105
              • Opcode ID: 898492acaf74ea289a4b1abf374ae8ce343aa8fa6b5fcf45f2a67521d94f0700
              • Instruction ID: 55e7c002fa58ce6702778abfdb8f66d052e820b40cdc1f432d31f099f6deb168
              • Opcode Fuzzy Hash: 898492acaf74ea289a4b1abf374ae8ce343aa8fa6b5fcf45f2a67521d94f0700
              • Instruction Fuzzy Hash: FE51D7B5E24156FFCB20DF9888D197EF7B9BF08200B548169E569D7641E374EE408BA0
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000007.00000002.3357917667.00000000051C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 051C0000, based on PE: true
              • Associated: 00000007.00000002.3357917667.00000000052E9000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.00000000052ED000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.000000000535E000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_51c0000_colorcpl.jbxd
              Similarity
              • API ID: ___swprintf_l
              • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
              • API String ID: 48624451-2108815105
              • Opcode ID: 1726362b60b7816840ea05c8f4a0401350845398795de48fc03e25dfb4219b64
              • Instruction ID: 69c6e08de18c725c02efef432268447bf0a88a4a7f05f9db4dca87338ef8d24a
              • Opcode Fuzzy Hash: 1726362b60b7816840ea05c8f4a0401350845398795de48fc03e25dfb4219b64
              • Instruction Fuzzy Hash: B851397AA14656EFCB34DF6CC89087FB7FAFF44300B048859E59AD7641D6B4EA408B60
              Strings
              • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 05264725
              • CLIENT(ntdll): Processing section info %ws..., xrefs: 05264787
              • Execute=1, xrefs: 05264713
              • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 05264742
              • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 052646FC
              • ExecuteOptions, xrefs: 052646A0
              • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 05264655
              Memory Dump Source
              • Source File: 00000007.00000002.3357917667.00000000051C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 051C0000, based on PE: true
              • Associated: 00000007.00000002.3357917667.00000000052E9000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.00000000052ED000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.000000000535E000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_51c0000_colorcpl.jbxd
              Similarity
              • API ID:
              • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
              • API String ID: 0-484625025
              • Opcode ID: faa68f7d9e38168bfb6922f244681b6d4c4f88b7dcd48a44ac8e729dee561031
              • Instruction ID: 9618c4151f1b693517502a8edc67407a771e225d5598a2aff000df6421533033
              • Opcode Fuzzy Hash: faa68f7d9e38168bfb6922f244681b6d4c4f88b7dcd48a44ac8e729dee561031
              • Instruction Fuzzy Hash: 8651197576822A7ADF11EBA4DC8EFB977A9FF04300F0800A9E509AB190DB709E45CF51
              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.3346631053.00000000008F0000.00000040.80000000.00040000.00000000.sdmp, Offset: 008F0000, based on PE: true
              • Associated: 00000007.00000002.3346631053.00000000008F3000.00000040.80000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_8f0000_colorcpl.jbxd
              Similarity
              • API ID: CurrentImageInfoNonwritableSleepStartup_amsg_exit_inittermexit
              • String ID:
              • API String ID: 2849151604-0
              • Opcode ID: c7184ec20e722d5d3a46d5cedc25123ba1d41b915415c6dba758d5c5fe0955fc
              • Instruction ID: 60c6923d59cfee8f63522f423110c82e6c8dbf0ab4ace7a765a4ec901b510fbb
              • Opcode Fuzzy Hash: c7184ec20e722d5d3a46d5cedc25123ba1d41b915415c6dba758d5c5fe0955fc
              • Instruction Fuzzy Hash: 3C41B475A4071DCBDF249B78984DB7976A5F798B21F20402AEB12D7290EB388940CB65
              Memory Dump Source
              • Source File: 00000007.00000002.3357917667.00000000051C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 051C0000, based on PE: true
              • Associated: 00000007.00000002.3357917667.00000000052E9000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.00000000052ED000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.000000000535E000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_51c0000_colorcpl.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2a48bdd4d8ea14c469ad441b94cf96c101b09c67394ceba66eb56f2a3b9e53c1
              • Instruction ID: e0ef68d2a7eea9ac5625c4e33a67ef1298c075dfe9cad45a7c62da119665249a
              • Opcode Fuzzy Hash: 2a48bdd4d8ea14c469ad441b94cf96c101b09c67394ceba66eb56f2a3b9e53c1
              • Instruction Fuzzy Hash: 2B021471628341AFC305CF68C494E6ABBE5FFC8700F148A6DF9899B265DB71E905CB42
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000007.00000002.3357917667.00000000051C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 051C0000, based on PE: true
              • Associated: 00000007.00000002.3357917667.00000000052E9000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.00000000052ED000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.000000000535E000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_51c0000_colorcpl.jbxd
              Similarity
              • API ID: __aulldvrm
              • String ID: +$-$0$0
              • API String ID: 1302938615-699404926
              • Opcode ID: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
              • Instruction ID: 469be294fc5489e948e640e0ddd14f98a53ec98146946d79ff786e06ff718ae6
              • Opcode Fuzzy Hash: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
              • Instruction Fuzzy Hash: 1D8191F1E2924A9ADF24CF68C8927FEBBB2FF45310F18415AD895A7291C77498418B50
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000007.00000002.3357917667.00000000051C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 051C0000, based on PE: true
              • Associated: 00000007.00000002.3357917667.00000000052E9000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.00000000052ED000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.000000000535E000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_51c0000_colorcpl.jbxd
              Similarity
              • API ID: ___swprintf_l
              • String ID: %%%u$[$]:%u
              • API String ID: 48624451-2819853543
              • Opcode ID: 501defaa7806d619b76816420bcca805f8e7941c813db0ca33d5e51cd734372c
              • Instruction ID: 3316f86d7575169538c149dc6be1bce04f37059a94f25f31022eea5d5db93197
              • Opcode Fuzzy Hash: 501defaa7806d619b76816420bcca805f8e7941c813db0ca33d5e51cd734372c
              • Instruction Fuzzy Hash: 1521517BA2011AEBCB10DE69D845ABEBBF9AF44744F040126E915E7201EB30D9018BA1
              Strings
              • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 052602E7
              • RTL: Re-Waiting, xrefs: 0526031E
              • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 052602BD
              Memory Dump Source
              • Source File: 00000007.00000002.3357917667.00000000051C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 051C0000, based on PE: true
              • Associated: 00000007.00000002.3357917667.00000000052E9000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.00000000052ED000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.000000000535E000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_51c0000_colorcpl.jbxd
              Similarity
              • API ID:
              • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
              • API String ID: 0-2474120054
              • Opcode ID: b58013d12c46e5b24eb5af69d2836e09ed3189125987c8ced10bcf8b204d66ed
              • Instruction ID: fdde31dfaf44939efce2195f5816c75587237c3f450e9d2f2856991ab68823b4
              • Opcode Fuzzy Hash: b58013d12c46e5b24eb5af69d2836e09ed3189125987c8ced10bcf8b204d66ed
              • Instruction Fuzzy Hash: 96E1C2706287429FD725CF28C988B2BB7E1BF94314F140A5DF8A98B2D0D774E885CB56
              Strings
              • RTL: Re-Waiting, xrefs: 05267BAC
              • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 05267B7F
              • RTL: Resource at %p, xrefs: 05267B8E
              Memory Dump Source
              • Source File: 00000007.00000002.3357917667.00000000051C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 051C0000, based on PE: true
              • Associated: 00000007.00000002.3357917667.00000000052E9000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.00000000052ED000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.000000000535E000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_51c0000_colorcpl.jbxd
              Similarity
              • API ID:
              • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
              • API String ID: 0-871070163
              • Opcode ID: 5787eed4339ab38eaed64339c16a4c20f900a805926a1e65f84bb0f981e3ad2c
              • Instruction ID: 94f3ed3ccb00b62ac8f0615a03ef64bf827c0d95068b8da1c6fe2bd6bf2c88a3
              • Opcode Fuzzy Hash: 5787eed4339ab38eaed64339c16a4c20f900a805926a1e65f84bb0f981e3ad2c
              • Instruction Fuzzy Hash: 2241E139328702AFC720DE25D840B6AB7E6FF88720F100A1DF95A9B280DB71E445CB91
              APIs
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0526728C
              Strings
              • RTL: Re-Waiting, xrefs: 052672C1
              • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 05267294
              • RTL: Resource at %p, xrefs: 052672A3
              Memory Dump Source
              • Source File: 00000007.00000002.3357917667.00000000051C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 051C0000, based on PE: true
              • Associated: 00000007.00000002.3357917667.00000000052E9000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.00000000052ED000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.000000000535E000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_51c0000_colorcpl.jbxd
              Similarity
              • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
              • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
              • API String ID: 885266447-605551621
              • Opcode ID: d74ec254e9c0afb2fb8579932bb48dcb0f4658400ebbab2d2bf259fa9cc168b2
              • Instruction ID: 925d04a1971d412abb586ccab666152ade8a5cb01be249acf8ccba1f7da54e11
              • Opcode Fuzzy Hash: d74ec254e9c0afb2fb8579932bb48dcb0f4658400ebbab2d2bf259fa9cc168b2
              • Instruction Fuzzy Hash: 79411F35724216ABC720DE24CC81F6AB7A6FF84714F140619FC59AB280DB31F882CBD0
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000007.00000002.3357917667.00000000051C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 051C0000, based on PE: true
              • Associated: 00000007.00000002.3357917667.00000000052E9000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.00000000052ED000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.000000000535E000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_51c0000_colorcpl.jbxd
              Similarity
              • API ID: ___swprintf_l
              • String ID: %%%u$]:%u
              • API String ID: 48624451-3050659472
              • Opcode ID: ec1643175bf3731e2a6a91e86b0d17f251987605e880ba9a68214ba427b7c4ce
              • Instruction ID: da63bfd61b7d37c0b4f2a34617d9d7d11db47fee8b2582ffe223070ea9f88258
              • Opcode Fuzzy Hash: ec1643175bf3731e2a6a91e86b0d17f251987605e880ba9a68214ba427b7c4ce
              • Instruction Fuzzy Hash: 04317176A20229DFCB24DE28DC44BAEB7E8FF45710F440556E849E7240EB30AA448FA0
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000007.00000002.3357917667.00000000051C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 051C0000, based on PE: true
              • Associated: 00000007.00000002.3357917667.00000000052E9000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.00000000052ED000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.000000000535E000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_51c0000_colorcpl.jbxd
              Similarity
              • API ID: __aulldvrm
              • String ID: +$-
              • API String ID: 1302938615-2137968064
              • Opcode ID: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
              • Instruction ID: 599aafb1a2fbac2749585f3fce9e42e0e0929a2fc6439cc2c59c11fe38e88cac
              • Opcode Fuzzy Hash: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
              • Instruction Fuzzy Hash: 309186F0F2421B9BDF24DF69C882ABEB7A6FF44720F18451AE859E72C0D7709A418750
              Strings
              Memory Dump Source
              • Source File: 00000007.00000002.3357917667.00000000051C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 051C0000, based on PE: true
              • Associated: 00000007.00000002.3357917667.00000000052E9000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.00000000052ED000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.000000000535E000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_51c0000_colorcpl.jbxd
              Similarity
              • API ID:
              • String ID: $$@
              • API String ID: 0-1194432280
              • Opcode ID: 0af4341d3c88573680fdd2ab99ffbcd1920e284af808f010c85e19a43242daca
              • Instruction ID: 9cf45158ebd0ef2ee6cbf46f0c5815b10fa0f71d62e7b725df16112a2721dd2c
              • Opcode Fuzzy Hash: 0af4341d3c88573680fdd2ab99ffbcd1920e284af808f010c85e19a43242daca
              • Instruction Fuzzy Hash: E4812B75D14269DBDB35DB54CC49BEEB7B8AF08710F0041EAAA19B7280D7709E85CFA0
              APIs
              • @_EH4_CallFilterFunc@8.LIBCMT ref: 0527CFBD
              Strings
              Memory Dump Source
              • Source File: 00000007.00000002.3357917667.00000000051C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 051C0000, based on PE: true
              • Associated: 00000007.00000002.3357917667.00000000052E9000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.00000000052ED000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000007.00000002.3357917667.000000000535E000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_51c0000_colorcpl.jbxd
              Similarity
              • API ID: CallFilterFunc@8
              • String ID: @$@4Cw@4Cw
              • API String ID: 4062629308-3101775584
              • Opcode ID: 265ac64bac1bba3c63168c73feda5f58bbdb3f80bb0360799de87a271e70a367
              • Instruction ID: 70ccc04c556cf43343478ade4952ce6cc8d36c9ecc6751a18641e8444ab21790
              • Opcode Fuzzy Hash: 265ac64bac1bba3c63168c73feda5f58bbdb3f80bb0360799de87a271e70a367
              • Instruction Fuzzy Hash: D241E471A20229DFCB21DFA4D844E6EBBF8FF55B10F00442AE916EB290D770D941CB61