Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rMT103SwiftCopyoFPayment.exe

Overview

General Information

Sample name:rMT103SwiftCopyoFPayment.exe
Analysis ID:1518056
MD5:0eee7af022b90b951f9284d4fadf88be
SHA1:e4a76a60e48b6b5f42b8224859a2d368cce5a1f5
SHA256:cfda50dfa3a323daf2ada9dadf993a2fc35587f288da3450b69b71e1c17b43e1
Tags:exeuser-Porcupine
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
AI detected suspicious sample
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • rMT103SwiftCopyoFPayment.exe (PID: 7532 cmdline: "C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe" MD5: 0EEE7AF022B90B951F9284D4FADF88BE)
    • RegSvcs.exe (PID: 7608 cmdline: "C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • KaGeys.exe (PID: 7932 cmdline: "C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • conhost.exe (PID: 7944 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • KaGeys.exe (PID: 8068 cmdline: "C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • conhost.exe (PID: 8076 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.laboratoriosvilla.com.mx", "Username": "compras@laboratoriosvilla.com.mx", "Password": "WZ,2pliw#L)D"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.3834275846.00000000029DE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000002.00000002.3833001951.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000002.3833001951.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000002.00000002.3834275846.00000000029B5000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000002.00000002.3834275846.00000000029B5000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 10 entries
            SourceRuleDescriptionAuthorStrings
            0.2.rMT103SwiftCopyoFPayment.exe.3c50000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.rMT103SwiftCopyoFPayment.exe.3c50000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.rMT103SwiftCopyoFPayment.exe.3c50000.1.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x328e2:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x32954:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x329de:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x32a70:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x32ada:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x32b4c:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x32be2:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x32c72:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                0.2.rMT103SwiftCopyoFPayment.exe.3c50000.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  0.2.rMT103SwiftCopyoFPayment.exe.3c50000.1.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                    Click to see the 6 entries

                    System Summary

                    barindex
                    Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 7608, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KaGeys
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 216.194.161.167, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 7608, Protocol: tcp, SourceIp: 192.168.2.7, SourceIsIpv6: false, SourcePort: 49707
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 0.2.rMT103SwiftCopyoFPayment.exe.3c50000.1.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.laboratoriosvilla.com.mx", "Username": "compras@laboratoriosvilla.com.mx", "Password": "WZ,2pliw#L)D"}
                    Source: rMT103SwiftCopyoFPayment.exeReversingLabs: Detection: 71%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                    Source: rMT103SwiftCopyoFPayment.exeJoe Sandbox ML: detected
                    Source: rMT103SwiftCopyoFPayment.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.7:49705 version: TLS 1.2
                    Source: Binary string: RegSvcs.pdb, source: KaGeys.exe, 00000004.00000000.1533899687.0000000000322000.00000002.00000001.01000000.00000006.sdmp, KaGeys.exe.2.dr
                    Source: Binary string: wntdll.pdbUGP source: rMT103SwiftCopyoFPayment.exe, 00000000.00000003.1402091211.0000000004760000.00000004.00001000.00020000.00000000.sdmp, rMT103SwiftCopyoFPayment.exe, 00000000.00000003.1402355172.00000000045C0000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: rMT103SwiftCopyoFPayment.exe, 00000000.00000003.1402091211.0000000004760000.00000004.00001000.00020000.00000000.sdmp, rMT103SwiftCopyoFPayment.exe, 00000000.00000003.1402355172.00000000045C0000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: RegSvcs.pdb source: KaGeys.exe, 00000004.00000000.1533899687.0000000000322000.00000002.00000001.01000000.00000006.sdmp, KaGeys.exe.2.dr
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B

                    Networking

                    barindex
                    Source: Yara matchFile source: 0.2.rMT103SwiftCopyoFPayment.exe.3c50000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1406244343.0000000003C50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: global trafficTCP traffic: 192.168.2.7:49707 -> 216.194.161.167:587
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                    Source: Joe Sandbox ViewASN Name: TUT-ASUS TUT-ASUS
                    Source: Joe Sandbox ViewASN Name: IMH-WESTUS IMH-WESTUS
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: ip-api.com
                    Source: global trafficTCP traffic: 192.168.2.7:49707 -> 216.194.161.167:587
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: time.windows.com
                    Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                    Source: global trafficDNS traffic detected: DNS query: ip-api.com
                    Source: global trafficDNS traffic detected: DNS query: mail.laboratoriosvilla.com.mx
                    Source: RegSvcs.exe, 00000002.00000002.3834275846.00000000029A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                    Source: rMT103SwiftCopyoFPayment.exe, 00000000.00000002.1406244343.0000000003C50000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3833001951.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3834275846.00000000029A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                    Source: RegSvcs.exe, 00000002.00000002.3834275846.00000000029E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://laboratoriosvilla.com.mx
                    Source: RegSvcs.exe, 00000002.00000002.3834275846.00000000029E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.laboratoriosvilla.com.mx
                    Source: RegSvcs.exe, 00000002.00000002.3837391874.0000000005B5E000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3837391874.0000000005BED000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3834275846.00000000029E6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3837391874.0000000005B37000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r11.i.lencr.org/0
                    Source: RegSvcs.exe, 00000002.00000002.3837391874.0000000005B5E000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3837391874.0000000005BED000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3834275846.00000000029E6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3837391874.0000000005B37000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r11.o.lencr.org0#
                    Source: RegSvcs.exe, 00000002.00000002.3834275846.0000000002951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: RegSvcs.exe, 00000002.00000002.3837391874.0000000005BE4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr
                    Source: RegSvcs.exe, 00000002.00000002.3837391874.0000000005B5E000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3837391874.0000000005BE4000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3834275846.00000000029E6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3837391874.0000000005B37000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                    Source: RegSvcs.exe, 00000002.00000002.3837391874.0000000005B5E000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3837391874.0000000005BE4000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3834275846.00000000029E6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3837391874.0000000005B37000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                    Source: rMT103SwiftCopyoFPayment.exe, 00000000.00000002.1406244343.0000000003C50000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3833001951.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: rMT103SwiftCopyoFPayment.exe, 00000000.00000002.1406244343.0000000003C50000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3833001951.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3834275846.0000000002951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                    Source: RegSvcs.exe, 00000002.00000002.3834275846.0000000002951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: RegSvcs.exe, 00000002.00000002.3834275846.0000000002951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                    Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.7:49705 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.rMT103SwiftCopyoFPayment.exe.3c50000.1.raw.unpack, NmHr1WHWKO.cs.Net Code: lsx2fUddI
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C81C

                    System Summary

                    barindex
                    Source: 0.2.rMT103SwiftCopyoFPayment.exe.3c50000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.rMT103SwiftCopyoFPayment.exe.3c50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 00000000.00000002.1406244343.0000000003C50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: initial sampleStatic PE information: Filename: rMT103SwiftCopyoFPayment.exe
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess Stats: CPU usage > 49%
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00446313
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_004096A00_2_004096A0
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0042200C0_2_0042200C
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0041A2170_2_0041A217
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_004122160_2_00412216
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0042435D0_2_0042435D
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_004033C00_2_004033C0
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0044F4300_2_0044F430
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_004125E80_2_004125E8
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0044663B0_2_0044663B
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_004138010_2_00413801
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0042096F0_2_0042096F
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_004129D00_2_004129D0
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_004119E30_2_004119E3
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0041C9AE0_2_0041C9AE
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0047EA6F0_2_0047EA6F
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0040FA100_2_0040FA10
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0044EB5F0_2_0044EB5F
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_00423C810_2_00423C81
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_00411E780_2_00411E78
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_00442E0C0_2_00442E0C
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_00420EC00_2_00420EC0
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0044CF170_2_0044CF17
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_00444FD20_2_00444FD2
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_03FC87480_2_03FC8748
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02804AD82_2_02804AD8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0280BAF02_2_0280BAF0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02803EC02_2_02803EC0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0280AF202_2_0280AF20
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_028042082_2_02804208
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0641BCEC2_2_0641BCEC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0641A6B82_2_0641A6B8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0641CE182_2_0641CE18
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0641EC102_2_0641EC10
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0643B2182_2_0643B218
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_064323502_2_06432350
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0643C1602_2_0643C160
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_064361D82_2_064361D8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_064351A02_2_064351A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_064358E02_2_064358E0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_064379682_2_06437968
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_064372882_2_06437288
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0643E3882_2_0643E388
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_064300402_2_06430040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_064300062_2_06430006
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: String function: 004115D7 appears 36 times
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: String function: 00416C70 appears 39 times
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: String function: 00445AE0 appears 65 times
                    Source: rMT103SwiftCopyoFPayment.exe, 00000000.00000003.1402482289.000000000488D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs rMT103SwiftCopyoFPayment.exe
                    Source: rMT103SwiftCopyoFPayment.exe, 00000000.00000003.1402766796.00000000046E3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs rMT103SwiftCopyoFPayment.exe
                    Source: rMT103SwiftCopyoFPayment.exe, 00000000.00000002.1406244343.0000000003C50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename0dc05c25-f673-4789-ade7-dd3770f175cc.exe4 vs rMT103SwiftCopyoFPayment.exe
                    Source: rMT103SwiftCopyoFPayment.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: 0.2.rMT103SwiftCopyoFPayment.exe.3c50000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.rMT103SwiftCopyoFPayment.exe.3c50000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 00000000.00000002.1406244343.0000000003C50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.rMT103SwiftCopyoFPayment.exe.3c50000.1.raw.unpack, ISZbPXDvPz.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.rMT103SwiftCopyoFPayment.exe.3c50000.1.raw.unpack, ISZbPXDvPz.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 0.2.rMT103SwiftCopyoFPayment.exe.3c50000.1.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.rMT103SwiftCopyoFPayment.exe.3c50000.1.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.rMT103SwiftCopyoFPayment.exe.3c50000.1.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.rMT103SwiftCopyoFPayment.exe.3c50000.1.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.rMT103SwiftCopyoFPayment.exe.3c50000.1.raw.unpack, YpS.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.rMT103SwiftCopyoFPayment.exe.3c50000.1.raw.unpack, YpS.csCryptographic APIs: 'TransformFinalBlock'
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/5@4/3
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0046CB5F OleInitialize,CLSIDFromProgID,CLSIDFromString,CoCreateInstance,CoInitializeSecurity,_wcslen,CoCreateInstanceEx,CoTaskMemFree,CoSetProxyBlanket,0_2_0046CB5F
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\KaGeysJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7944:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8076:120:WilError_03
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeFile created: C:\Users\user~1\AppData\Local\Temp\undiscerniblyJump to behavior
                    Source: rMT103SwiftCopyoFPayment.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeFile read: C:\Users\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: rMT103SwiftCopyoFPayment.exeReversingLabs: Detection: 71%
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeFile read: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe "C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe"
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exe "C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exe"
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exe "C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exe"
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeSection loaded: msdart.dllJump to behavior
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeSection loaded: sxs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: rMT103SwiftCopyoFPayment.exeStatic file information: File size 1165203 > 1048576
                    Source: Binary string: RegSvcs.pdb, source: KaGeys.exe, 00000004.00000000.1533899687.0000000000322000.00000002.00000001.01000000.00000006.sdmp, KaGeys.exe.2.dr
                    Source: Binary string: wntdll.pdbUGP source: rMT103SwiftCopyoFPayment.exe, 00000000.00000003.1402091211.0000000004760000.00000004.00001000.00020000.00000000.sdmp, rMT103SwiftCopyoFPayment.exe, 00000000.00000003.1402355172.00000000045C0000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: rMT103SwiftCopyoFPayment.exe, 00000000.00000003.1402091211.0000000004760000.00000004.00001000.00020000.00000000.sdmp, rMT103SwiftCopyoFPayment.exe, 00000000.00000003.1402355172.00000000045C0000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: RegSvcs.pdb source: KaGeys.exe, 00000004.00000000.1533899687.0000000000322000.00000002.00000001.01000000.00000006.sdmp, KaGeys.exe.2.dr
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
                    Source: rMT103SwiftCopyoFPayment.exeStatic PE information: real checksum: 0xa961f should be: 0x127a31
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0280EFB0 push esp; ret 2_2_0280F379
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02800C45 push ebx; retf 2_2_02800C52
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02800C6D push edi; retf 2_2_02800C7A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_064163F0 push es; ret 2_2_06416400
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeJump to dropped file
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run KaGeysJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run KaGeysJump to behavior

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: rMT103SwiftCopyoFPayment.exe PID: 7532, type: MEMORYSTR
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeAPI/Special instruction interceptor: Address: 3FC836C
                    Source: rMT103SwiftCopyoFPayment.exe, 00000000.00000002.1406244343.0000000003C50000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3833001951.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3834275846.00000000029B5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeMemory allocated: E00000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeMemory allocated: 2690000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeMemory allocated: 25B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeMemory allocated: 2D10000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeMemory allocated: 2F00000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeMemory allocated: 4F00000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599890Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599672Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599453Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599338Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599207Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599078Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598968Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595578Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595468Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595357Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595249Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595140Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595031Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594921Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594812Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594703Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594593Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594484Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594374Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594265Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594132Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593951Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593828Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2634Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7201Jump to behavior
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-87562
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeAPI coverage: 3.6 %
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exe TID: 8000Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exe TID: 8124Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599890Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599672Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599453Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599338Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599207Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599078Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598968Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99891Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99782Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99657Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99532Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99407Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99297Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99188Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99063Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98938Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98813Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98688Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98578Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98469Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98350Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98235Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98125Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97628Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97500Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97391Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97282Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97157Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97032Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96922Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96813Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595578Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595468Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595357Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595249Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595140Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595031Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594921Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594812Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594703Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594593Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594484Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594374Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594265Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594132Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593951Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593828Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: RegSvcs.exe, 00000002.00000002.3834275846.00000000029B5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                    Source: RegSvcs.exe, 00000002.00000002.3834275846.00000000029B5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                    Source: RegSvcs.exe, 00000002.00000002.3833001951.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: VMwareVBox
                    Source: RegSvcs.exe, 00000002.00000002.3837391874.0000000005B5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll>
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeAPI call chain: ExitProcess graph end nodegraph_0-86690

                    Anti Debugging

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02807EE0 CheckRemoteDebuggerPresent,2_2_02807EE0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_03FC8638 mov eax, dword ptr fs:[00000030h]0_2_03FC8638
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_03FC85D8 mov eax, dword ptr fs:[00000030h]0_2_03FC85D8
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_03FC6F88 mov eax, dword ptr fs:[00000030h]0_2_03FC6F88
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 7F7008Jump to behavior
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
                    Source: rMT103SwiftCopyoFPayment.exeBinary or memory string: Shell_TrayWnd
                    Source: rMT103SwiftCopyoFPayment.exeBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeQueries volume information: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeQueries volume information: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_0041E364
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.rMT103SwiftCopyoFPayment.exe.3c50000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.rMT103SwiftCopyoFPayment.exe.3c50000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.3834275846.00000000029DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.3833001951.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.3834275846.00000000029B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.3834275846.00000000029F3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1406244343.0000000003C50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: rMT103SwiftCopyoFPayment.exe PID: 7532, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7608, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: rMT103SwiftCopyoFPayment.exeBinary or memory string: WIN_XP
                    Source: rMT103SwiftCopyoFPayment.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
                    Source: rMT103SwiftCopyoFPayment.exeBinary or memory string: WIN_XPe
                    Source: rMT103SwiftCopyoFPayment.exeBinary or memory string: WIN_VISTA
                    Source: rMT103SwiftCopyoFPayment.exeBinary or memory string: WIN_7
                    Source: rMT103SwiftCopyoFPayment.exeBinary or memory string: WIN_8
                    Source: Yara matchFile source: 0.2.rMT103SwiftCopyoFPayment.exe.3c50000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.rMT103SwiftCopyoFPayment.exe.3c50000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.3833001951.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.3834275846.00000000029B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1406244343.0000000003C50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: rMT103SwiftCopyoFPayment.exe PID: 7532, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7608, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.rMT103SwiftCopyoFPayment.exe.3c50000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.rMT103SwiftCopyoFPayment.exe.3c50000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.3834275846.00000000029DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.3833001951.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.3834275846.00000000029B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.3834275846.00000000029F3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1406244343.0000000003C50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: rMT103SwiftCopyoFPayment.exe PID: 7532, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7608, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
                    Source: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire Infrastructure2
                    Valid Accounts
                    221
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    Exploitation for Privilege Escalation
                    11
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    2
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts2
                    Native API
                    2
                    Valid Accounts
                    1
                    DLL Side-Loading
                    11
                    Deobfuscate/Decode Files or Information
                    121
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAt1
                    Registry Run Keys / Startup Folder
                    2
                    Valid Accounts
                    2
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    2
                    File and Directory Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                    Access Token Manipulation
                    1
                    DLL Side-Loading
                    NTDS128
                    System Information Discovery
                    Distributed Component Object Model121
                    Input Capture
                    2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                    Process Injection
                    1
                    Masquerading
                    LSA Secrets641
                    Security Software Discovery
                    SSH3
                    Clipboard Data
                    23
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                    Registry Run Keys / Startup Folder
                    2
                    Valid Accounts
                    Cached Domain Credentials251
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items251
                    Virtualization/Sandbox Evasion
                    DCSync2
                    Process Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                    Access Token Manipulation
                    Proc Filesystem11
                    Application Window Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
                    Process Injection
                    /etc/passwd and /etc/shadow1
                    System Owner/User Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                    Hidden Files and Directories
                    Network Sniffing1
                    System Network Configuration Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1518056 Sample: rMT103SwiftCopyoFPayment.exe Startdate: 25/09/2024 Architecture: WINDOWS Score: 100 25 mail.laboratoriosvilla.com.mx 2->25 27 laboratoriosvilla.com.mx 2->27 29 3 other IPs or domains 2->29 45 Found malware configuration 2->45 47 Malicious sample detected (through community Yara rule) 2->47 49 Multi AV Scanner detection for submitted file 2->49 51 8 other signatures 2->51 7 rMT103SwiftCopyoFPayment.exe 1 2->7         started        10 KaGeys.exe 2 2->10         started        12 KaGeys.exe 1 2->12         started        signatures3 process4 signatures5 53 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 7->53 55 Writes to foreign memory regions 7->55 57 Maps a DLL or memory area into another process 7->57 59 Switches to a custom stack to bypass stack traces 7->59 14 RegSvcs.exe 16 4 7->14         started        19 conhost.exe 10->19         started        21 conhost.exe 12->21         started        process6 dnsIp7 31 ip-api.com 208.95.112.1, 49706, 80 TUT-ASUS United States 14->31 33 laboratoriosvilla.com.mx 216.194.161.167, 49707, 587 IMH-WESTUS United States 14->33 35 api.ipify.org 104.26.13.205, 443, 49705 CLOUDFLARENETUS United States 14->35 23 C:\Users\user\AppData\Roaming\...\KaGeys.exe, PE32 14->23 dropped 37 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->37 39 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 14->39 41 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 14->41 43 5 other signatures 14->43 file8 signatures9

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    rMT103SwiftCopyoFPayment.exe71%ReversingLabsWin32.Trojan.Autoitinject
                    rMT103SwiftCopyoFPayment.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exe0%ReversingLabs
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://api.ipify.org/0%URL Reputationsafe
                    https://api.ipify.org0%URL Reputationsafe
                    https://account.dyn.com/0%URL Reputationsafe
                    http://x1.c.lencr.org/00%URL Reputationsafe
                    http://x1.i.lencr.org/00%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    http://ip-api.com/line/?fields=hosting0%URL Reputationsafe
                    http://mail.laboratoriosvilla.com.mx0%Avira URL Cloudsafe
                    https://api.ipify.org/t0%Avira URL Cloudsafe
                    http://x1.c.lencr0%Avira URL Cloudsafe
                    http://laboratoriosvilla.com.mx0%Avira URL Cloudsafe
                    http://r11.o.lencr.org0#0%Avira URL Cloudsafe
                    http://r11.i.lencr.org/00%Avira URL Cloudsafe
                    http://ip-api.com0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    laboratoriosvilla.com.mx
                    216.194.161.167
                    truetrue
                      unknown
                      api.ipify.org
                      104.26.13.205
                      truefalse
                        unknown
                        ip-api.com
                        208.95.112.1
                        truetrue
                          unknown
                          mail.laboratoriosvilla.com.mx
                          unknown
                          unknowntrue
                            unknown
                            time.windows.com
                            unknown
                            unknownfalse
                              unknown
                              NameMaliciousAntivirus DetectionReputation
                              https://api.ipify.org/false
                              • URL Reputation: safe
                              unknown
                              http://ip-api.com/line/?fields=hostingfalse
                              • URL Reputation: safe
                              unknown
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://api.ipify.orgrMT103SwiftCopyoFPayment.exe, 00000000.00000002.1406244343.0000000003C50000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3833001951.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3834275846.0000000002951000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://account.dyn.com/rMT103SwiftCopyoFPayment.exe, 00000000.00000002.1406244343.0000000003C50000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3833001951.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://r11.o.lencr.org0#RegSvcs.exe, 00000002.00000002.3837391874.0000000005B5E000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3837391874.0000000005BED000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3834275846.00000000029E6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3837391874.0000000005B37000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://mail.laboratoriosvilla.com.mxRegSvcs.exe, 00000002.00000002.3834275846.00000000029E6000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://x1.c.lencrRegSvcs.exe, 00000002.00000002.3837391874.0000000005BE4000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://x1.c.lencr.org/0RegSvcs.exe, 00000002.00000002.3837391874.0000000005B5E000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3837391874.0000000005BE4000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3834275846.00000000029E6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3837391874.0000000005B37000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://x1.i.lencr.org/0RegSvcs.exe, 00000002.00000002.3837391874.0000000005B5E000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3837391874.0000000005BE4000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3834275846.00000000029E6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3837391874.0000000005B37000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://ip-api.comRegSvcs.exe, 00000002.00000002.3834275846.00000000029A1000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://laboratoriosvilla.com.mxRegSvcs.exe, 00000002.00000002.3834275846.00000000029E6000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://api.ipify.org/tRegSvcs.exe, 00000002.00000002.3834275846.0000000002951000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.3834275846.0000000002951000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://r11.i.lencr.org/0RegSvcs.exe, 00000002.00000002.3837391874.0000000005B5E000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3837391874.0000000005BED000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3834275846.00000000029E6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3837391874.0000000005B37000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              208.95.112.1
                              ip-api.comUnited States
                              53334TUT-ASUStrue
                              104.26.13.205
                              api.ipify.orgUnited States
                              13335CLOUDFLARENETUSfalse
                              216.194.161.167
                              laboratoriosvilla.com.mxUnited States
                              22611IMH-WESTUStrue
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1518056
                              Start date and time:2024-09-25 11:05:13 +02:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 9m 9s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:12
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:rMT103SwiftCopyoFPayment.exe
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@7/5@4/3
                              EGA Information:
                              • Successful, ratio: 50%
                              HCA Information:
                              • Successful, ratio: 100%
                              • Number of executed functions: 54
                              • Number of non-executed functions: 299
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe
                              • Excluded IPs from analysis (whitelisted): 20.101.57.9
                              • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, twc.trafficmanager.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                              • Execution Graph export aborted for target KaGeys.exe, PID 7932 because it is empty
                              • Execution Graph export aborted for target KaGeys.exe, PID 8068 because it is empty
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size exceeded maximum capacity and may have missing disassembly code.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • VT rate limit hit for: rMT103SwiftCopyoFPayment.exe
                              TimeTypeDescription
                              05:06:26API Interceptor11335671x Sleep call for process: RegSvcs.exe modified
                              11:06:29AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run KaGeys C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exe
                              11:06:39AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run KaGeys C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exe
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              208.95.112.1QUOTE_467654.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              COMMERCAIL INVOICE AND TNT AWB TRACKING INVOICE.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              PO Invoice XJ210821Q.PDF.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              PO Invoice XJ210821Q.PDF.scr.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              comprobante_HSBC_765543465768798086756458665345768.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              Company profile.jsGet hashmaliciousPXRECVOWEIWOEI Stealer, PureLog StealerBrowse
                              • ip-api.com/line/?fields=hosting
                              SecuriteInfo.com.Win32.SpywareX-gen.28752.22116.exeGet hashmaliciousPureLog StealerBrowse
                              • ip-api.com/json/
                              SecuriteInfo.com.Win32.SpywareX-gen.28752.22116.exeGet hashmaliciousPureLog StealerBrowse
                              • ip-api.com/json/
                              tQthxQV78N.exeGet hashmaliciousClipboard Hijacker, QuasarBrowse
                              • ip-api.com/json/
                              ELcnK80Ehf.exeGet hashmaliciousClipboard Hijacker, QuasarBrowse
                              • ip-api.com/json/
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              ip-api.comQUOTE_467654.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              COMMERCAIL INVOICE AND TNT AWB TRACKING INVOICE.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              http://getcloudapp.comGet hashmaliciousUnknownBrowse
                              • 208.95.112.2
                              PO Invoice XJ210821Q.PDF.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              PO Invoice XJ210821Q.PDF.scr.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              comprobante_HSBC_765543465768798086756458665345768.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              Company profile.jsGet hashmaliciousPXRECVOWEIWOEI Stealer, PureLog StealerBrowse
                              • 208.95.112.1
                              SecuriteInfo.com.Win32.SpywareX-gen.28752.22116.exeGet hashmaliciousPureLog StealerBrowse
                              • 208.95.112.1
                              SecuriteInfo.com.Win32.SpywareX-gen.28752.22116.exeGet hashmaliciousPureLog StealerBrowse
                              • 208.95.112.1
                              tQthxQV78N.exeGet hashmaliciousClipboard Hijacker, QuasarBrowse
                              • 208.95.112.1
                              api.ipify.orghttps://www.canva.com/design/DAGRqYHU9fM/qLQ4eWyHLFZd4WO6lX1hvg/view?utm_content=DAGRqYHU9fM&utm_campaign=designshare&utm_medium=link&utm_source=editorGet hashmaliciousHTMLPhisherBrowse
                              • 104.26.13.205
                              Zoom_Invite.call-660194855683.wsfGet hashmaliciousXWormBrowse
                              • 104.26.12.205
                              reported_account_violation-pdf-67223451.wsfGet hashmaliciousXWormBrowse
                              • 104.26.13.205
                              COMMERCAIL INVOICE AND TNT AWB TRACKING INVOICE.exeGet hashmaliciousAgentTeslaBrowse
                              • 104.26.12.205
                              http://pub-647efec841f2469ea102ef18827f7780.r2.dev/secure_response.htmlGet hashmaliciousGreatness Phishing Kit, HTMLPhisherBrowse
                              • 104.26.12.205
                              http://pub-afa55f53401b48e6ad155daf536ad34c.r2.dev/utility_base.htmlGet hashmaliciousGreatness Phishing Kit, HTMLPhisherBrowse
                              • 104.26.13.205
                              http://pub-4d560104a89740f899e90e13245f1971.r2.dev/secure_response.htmlGet hashmaliciousGreatness Phishing Kit, HTMLPhisherBrowse
                              • 172.67.74.152
                              http://pub-853a8c6d224746258050ceb1dd4dc8c3.r2.dev/response_auth.htmlGet hashmaliciousGreatness Phishing Kit, HTMLPhisherBrowse
                              • 172.67.74.152
                              http://pub-382f9bec371e490e8d86f2689f3915b0.r2.dev/response_start.htmlGet hashmaliciousUnknownBrowse
                              • 104.26.12.205
                              http://pub-8cc4fdf972304092b2aa97a68f50cd88.r2.dev/secure_response.htmlGet hashmaliciousGreatness Phishing Kit, HTMLPhisherBrowse
                              • 104.26.13.205
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              IMH-WESTUSCOMMERCAIL INVOICE AND TNT AWB TRACKING INVOICE.exeGet hashmaliciousAgentTeslaBrowse
                              • 216.194.161.167
                              bF9JDHS47l.vbsGet hashmaliciousRemcosBrowse
                              • 199.250.212.228
                              Nuovo Ordine.vbsGet hashmaliciousUnknownBrowse
                              • 199.250.212.228
                              Duclot Collections.batGet hashmaliciousRemcos, DBatLoaderBrowse
                              • 144.208.71.134
                              SKMBT_77122024816310TD01_20220128_17311 .vbsGet hashmaliciousRemcosBrowse
                              • 199.250.212.228
                              https://ar4download.com/Get hashmaliciousUnknownBrowse
                              • 173.231.197.194
                              https://sinintermediarios.uy/bc/blockchain.com/email/Get hashmaliciousUnknownBrowse
                              • 173.247.253.88
                              https://elc-path.com/pdfglobal2/docs89q9eqwwe/login.php#wa=wsignin1.0&rpsnv=13&ct=1539585327&rver=7.0.6737.0&wp=MBI_SSL&wreply=https%3a%2f%2foutlook.live.com%2fowa%2f%3fnlp%3d1%26RpsCsrfState%3d715d44a2-2f11-4282-f625-a066679e96e2&id=292841&CBCXT=out&lw=1&fl=dob%2cflname%2cwld&cobrandid=90015Get hashmaliciousHTMLPhisherBrowse
                              • 192.249.123.145
                              AG Uncorked IRMI Wine Mixer Invite.pdfGet hashmaliciousHTMLPhisherBrowse
                              • 205.134.254.189
                              z2PURCHASEORDER.exeGet hashmaliciousSnake KeyloggerBrowse
                              • 216.194.161.167
                              CLOUDFLARENETUShttps://qrplanet.com/smdv5p/Get hashmaliciousUnknownBrowse
                              • 104.21.83.115
                              AMTEmu #U2013 Universal Adobe Patcher.urlGet hashmaliciousUnknownBrowse
                              • 188.114.96.3
                              MailAttachment.htmlGet hashmaliciousHTMLPhisherBrowse
                              • 188.114.97.3
                              (PO403810)_VOLEX_doc.exeGet hashmaliciousLokibotBrowse
                              • 188.114.97.3
                              https://www.canva.com/design/DAGRqYHU9fM/qLQ4eWyHLFZd4WO6lX1hvg/view?utm_content=DAGRqYHU9fM&utm_campaign=designshare&utm_medium=link&utm_source=editorGet hashmaliciousHTMLPhisherBrowse
                              • 104.18.38.76
                              LaWl4DY2kW.exeGet hashmaliciousLummaCBrowse
                              • 104.21.37.97
                              CSBls4grBI.exeGet hashmaliciousLummaC, Socks5SystemzBrowse
                              • 188.114.96.3
                              AWS 1301241710.docx.docGet hashmaliciousRemcos, PureLog StealerBrowse
                              • 188.114.97.9
                              RFQ-948563836483638563735435376354.xlsGet hashmaliciousRemcos, GuLoaderBrowse
                              • 188.114.96.3
                              ACeTKO93e9.exeGet hashmaliciousLummaCBrowse
                              • 104.21.58.182
                              TUT-ASUSQUOTE_467654.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              COMMERCAIL INVOICE AND TNT AWB TRACKING INVOICE.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              http://getcloudapp.comGet hashmaliciousUnknownBrowse
                              • 208.95.112.2
                              PO Invoice XJ210821Q.PDF.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              PO Invoice XJ210821Q.PDF.scr.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              comprobante_HSBC_765543465768798086756458665345768.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              Company profile.jsGet hashmaliciousPXRECVOWEIWOEI Stealer, PureLog StealerBrowse
                              • 208.95.112.1
                              SecuriteInfo.com.Win32.SpywareX-gen.28752.22116.exeGet hashmaliciousPureLog StealerBrowse
                              • 208.95.112.1
                              SecuriteInfo.com.Win32.SpywareX-gen.28752.22116.exeGet hashmaliciousPureLog StealerBrowse
                              • 208.95.112.1
                              tQthxQV78N.exeGet hashmaliciousClipboard Hijacker, QuasarBrowse
                              • 208.95.112.1
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              3b5074b1b5d032e5620f69f9f700ff0eMailAttachment.htmlGet hashmaliciousHTMLPhisherBrowse
                              • 104.26.13.205
                              Meeting-037-911.oneGet hashmaliciousHTMLPhisherBrowse
                              • 104.26.13.205
                              117532123_20240925-9_MCZB#U00b7pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                              • 104.26.13.205
                              New_Document-660128863990.wsfGet hashmaliciousUnknownBrowse
                              • 104.26.13.205
                              New_Document-660119928827.wsfGet hashmaliciousUnknownBrowse
                              • 104.26.13.205
                              Happy Fiestas Patrias#U00b7pdf.vbsGet hashmaliciousGuLoader, LokibotBrowse
                              • 104.26.13.205
                              Order draft.vbsGet hashmaliciousAzorult, PureLog StealerBrowse
                              • 104.26.13.205
                              B#U00dcDC#U018f SOR#U011eU 09-24-2024#U00b7pdf.vbsGet hashmaliciousGuLoader, LokibotBrowse
                              • 104.26.13.205
                              Inquiry List.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                              • 104.26.13.205
                              Crystal Order.vbsGet hashmaliciousGuLoaderBrowse
                              • 104.26.13.205
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exeShipping Document.exeGet hashmaliciousAgentTeslaBrowse
                                COMMERCAIL INVOICE AND TNT AWB TRACKING INVOICE.exeGet hashmaliciousAgentTeslaBrowse
                                  DHL- CBJ520818836689.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                    DHL- CBJ520818836689.exeGet hashmaliciousAgentTeslaBrowse
                                      Shipping documents.exeGet hashmaliciousAgentTeslaBrowse
                                        Shipping doc.exeGet hashmaliciousAgentTeslaBrowse
                                          80c619d931fa4e5c89fe87aac0b6b143.exeGet hashmaliciousXWormBrowse
                                            Rejected Shipping Documents compiled PL pdf.exeGet hashmaliciousAgentTeslaBrowse
                                              Public Holiday mem_Notice 2024.exeGet hashmaliciousAgentTeslaBrowse
                                                D65youPyf5.exeGet hashmaliciousXWormBrowse
                                                  Process:C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:modified
                                                  Size (bytes):142
                                                  Entropy (8bit):5.090621108356562
                                                  Encrypted:false
                                                  SSDEEP:3:QHXMKa/xwwUC7WglAFXMWA2yTMGfsbNRLFS9Am12MFuAvOAsDeieVyn:Q3La/xwczlAFXMWTyAGCDLIP12MUAvvw
                                                  MD5:8C0458BB9EA02D50565175E38D577E35
                                                  SHA1:F0B50702CD6470F3C17D637908F83212FDBDB2F2
                                                  SHA-256:C578E86DB701B9AFA3626E804CF434F9D32272FF59FB32FA9A51835E5A148B53
                                                  SHA-512:804A47494D9A462FFA6F39759480700ECBE5A7F3A15EC3A6330176ED9C04695D2684BF6BF85AB86286D52E7B727436D0BB2E8DA96E20D47740B5CE3F856B5D0F
                                                  Malicious:false
                                                  Reputation:high, very likely benign file
                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.EnterpriseServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                  Process:C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe
                                                  File Type:data
                                                  Category:modified
                                                  Size (bytes):244736
                                                  Entropy (8bit):6.712373370624165
                                                  Encrypted:false
                                                  SSDEEP:6144:gz/gezvjtp7DhBAIPRoImV4ngMOjcVtbXYrLRLYZKeV8chbM:sH7L7TPRor4ngMGc/bXMLRskebhbM
                                                  MD5:B18A64ECD6C0E802D247417693C4D018
                                                  SHA1:25D007036BC11F827E55314AD6E7142766F74F02
                                                  SHA-256:F0A926FB036AE51C92FCEBBEAE8D92744EEE5C2E2258124523D4BE931252AAB9
                                                  SHA-512:704AAB84CB83372599DA6AB39A690CD67C323731C409E48A6DD6B7022A21B098CD3447E09FAEA2D6246595C8B1E628BBDC58A398181C26495B1C4CB691D5B71A
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:{..BPH7LQN8Y..LS.4IJ86E7.SH7LUN8YC0LSW4IJ86E7BSH7LUN8YC0LSW4.J86K(.]H.E.o.X..m.?]:jHD*P02%./4 V67..6wF<$._+.....!:*]wN=FwW4IJ86Eg.SH{MVN...ULSW4IJ86.7@RC6GUN.ZC0DSW4IJ8..4BSh7LU.;YC0.SW.IJ84E7FSH7LUN8]C0LSW4IJ.2E7@SH7LUN:Y..LSG4IZ86E7RSH'LUN8YC LSW4IJ86E7B..4L.N8YC.OS.1IJ86E7BSH7LUN8YC0LSW0IF86E7BSH7LUN8YC0LSW4IJ86E7BSH7LUN8YC0LSW4IJ86E7BSH7LUn8YK0LSW4IJ86E7JsH7.UN8YC0LSW4IdLS=CBSH..VN8yC0L.T4IH86E7BSH7LUN8YC.LS7.;9JUE7B.M7LU.;YC6LSW.JJ86E7BSH7LUN8.C0.}%Q%%[6E;BSH7LQN8[C0L.T4IJ86E7BSH7LU.8Y.0LSW4IJ86E7BSH7L.;YC0LS.4IJ:6@7J.J7.bO8ZC0LRW4OJ86E7BSH7LUN8YC0LSW4IJ86E7BSH7LUN8YC0LSW4IJ86E7BN...pg.MrY53.l.Q.4..[..,.wV.%.(C...~;......9S.qY.?|...@....B.[MNM......,X&:!.O.JV.N...s.-.{.U9.3...;..=N..|..e....xF>fn..6..T#8`Y)3\)}.U/+J_.5.RH7LU.......]1.b.F8\gZO....w"4.....F6E7&SH7>UN88C0L.W4I%86EYBSHILUNFYC0.SW4.J86r7BSm7LU#8YC.LSWJIJ8.88M...%&..YC0LSb..z.[........(.N.1o.\....V..C=.O..w..Y..!t.Re)Uky.RO>]F2KWT8tDs..cQL3IWI<ZO.B...k....{..=....9.0SW4IJ8.E7.SH7..N.YC0.S.4..86E..S.7.U..C
                                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                  File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:modified
                                                  Size (bytes):45984
                                                  Entropy (8bit):6.16795797263964
                                                  Encrypted:false
                                                  SSDEEP:768:4BbSoy+SdIBf0k2dsjYg6Iq8S1GYqWH8BR:noOIBf0ddsjY/ZGyc7
                                                  MD5:9D352BC46709F0CB5EC974633A0C3C94
                                                  SHA1:1969771B2F022F9A86D77AC4D4D239BECDF08D07
                                                  SHA-256:2C1EEB7097023C784C2BD040A2005A5070ED6F3A4ABF13929377A9E39FAB1390
                                                  SHA-512:13C714244EC56BEEB202279E4109D59C2A43C3CF29F90A374A751C04FD472B45228CA5A0178F41109ED863DBD34E0879E4A21F5E38AE3D89559C57E6BE990A9B
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Joe Sandbox View:
                                                  • Filename: Shipping Document.exe, Detection: malicious, Browse
                                                  • Filename: COMMERCAIL INVOICE AND TNT AWB TRACKING INVOICE.exe, Detection: malicious, Browse
                                                  • Filename: DHL- CBJ520818836689.pdf.exe, Detection: malicious, Browse
                                                  • Filename: DHL- CBJ520818836689.exe, Detection: malicious, Browse
                                                  • Filename: Shipping documents.exe, Detection: malicious, Browse
                                                  • Filename: Shipping doc.exe, Detection: malicious, Browse
                                                  • Filename: 80c619d931fa4e5c89fe87aac0b6b143.exe, Detection: malicious, Browse
                                                  • Filename: Rejected Shipping Documents compiled PL pdf.exe, Detection: malicious, Browse
                                                  • Filename: Public Holiday mem_Notice 2024.exe, Detection: malicious, Browse
                                                  • Filename: D65youPyf5.exe, Detection: malicious, Browse
                                                  Reputation:moderate, very likely benign file
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0..d..........V.... ........@.. ..............................s.....`.....................................O.......8............r...A.......................................................... ............... ..H............text...\c... ...d.................. ..`.rsrc...8............f..............@..@.reloc...............p..............@..B................8.......H........+...S..........|...P...........................................r...p(....*2.(....(....*z..r...p(....(....(......}....*..{....*.s.........*.0..{...........Q.-.s.....+i~....o....(.....s.......o.....r!..p..(....Q.P,:.P.....(....o....o ........(....o!...o".....,..o#...t......*..0..(....... ....s$........o%....X..(....-..*.o&...*.0...........('......&.....*.*...................0...........(.......&.....*.................0............(.....(....~....,.(....~....o....9]...
                                                  Process:C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1141
                                                  Entropy (8bit):4.442398121585593
                                                  Encrypted:false
                                                  SSDEEP:24:zKLXkhDObntKlglUEnfQtvNuNpKOK5aM9YJC:zKL0hDQntKKH1MqJC
                                                  MD5:6FB4D27A716A8851BC0505666E7C7A10
                                                  SHA1:AD2A232C6E709223532C4D1AB892303273D8C814
                                                  SHA-256:1DC36F296CE49BDF1D560B527DB06E1E9791C10263459A67EACE706C6DDCDEAE
                                                  SHA-512:3192095C68C6B7AD94212B7BCA0563F2058BCE00C0C439B90F0E96EA2F029A37C2F2B69487591B494C1BA54697FE891E214582E392127CB8C90AB682E0D81ADB
                                                  Malicious:false
                                                  Preview:Microsoft (R) .NET Framework Services Installation Utility Version 4.8.4084.0..Copyright (C) Microsoft Corporation. All rights reserved.....USAGE: regsvcs.exe [options] AssemblyName..Options:.. /? or /help Display this usage message... /fc Find or create target application (default)... /c Create target application, error if it already exists... /exapp Expect an existing application... /tlb:<tlbfile> Filename for the exported type library... /appname:<name> Use the specified name for the target application... /parname:<name> Use the specified name or id for the target partition... /extlb Use an existing type library... /reconfig Reconfigure existing target application (default)... /noreconfig Don't reconfigure existing target application... /u Uninstall target application... /nologo Suppress logo output... /quiet Suppress logo output and success output... /c
                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Entropy (8bit):7.413414803920439
                                                  TrID:
                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                  • DOS Executable Generic (2002/1) 0.02%
                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                  File name:rMT103SwiftCopyoFPayment.exe
                                                  File size:1'165'203 bytes
                                                  MD5:0eee7af022b90b951f9284d4fadf88be
                                                  SHA1:e4a76a60e48b6b5f42b8224859a2d368cce5a1f5
                                                  SHA256:cfda50dfa3a323daf2ada9dadf993a2fc35587f288da3450b69b71e1c17b43e1
                                                  SHA512:c4c5b5e1b0aba27f6ff62b887970d409fde27b1d6fabdcd51edcc3e329138cb0a50599bc73084f8932a35a84cb891df6c937fd7b10a7c701acc3a20f1e8322f7
                                                  SSDEEP:24576:uRmJkcoQricOIQxiZY1iaC9naYeCPZupXQpBM9lnqYHS:7JZoQrbTFZY1iaCtamZoXQBWlnqYHS
                                                  TLSH:2B45E121F9C69076C2B323B19E7FF769963D69360336D19727C82D215EA04816B3A733
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
                                                  Icon Hash:1733312925935517
                                                  Entrypoint:0x4165c1
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                  DLL Characteristics:TERMINAL_SERVER_AWARE
                                                  Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:5
                                                  OS Version Minor:0
                                                  File Version Major:5
                                                  File Version Minor:0
                                                  Subsystem Version Major:5
                                                  Subsystem Version Minor:0
                                                  Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
                                                  Instruction
                                                  call 00007F65E49491BBh
                                                  jmp 00007F65E494002Eh
                                                  int3
                                                  int3
                                                  int3
                                                  int3
                                                  int3
                                                  push ebp
                                                  mov ebp, esp
                                                  push edi
                                                  push esi
                                                  mov esi, dword ptr [ebp+0Ch]
                                                  mov ecx, dword ptr [ebp+10h]
                                                  mov edi, dword ptr [ebp+08h]
                                                  mov eax, ecx
                                                  mov edx, ecx
                                                  add eax, esi
                                                  cmp edi, esi
                                                  jbe 00007F65E49401AAh
                                                  cmp edi, eax
                                                  jc 00007F65E4940346h
                                                  cmp ecx, 00000080h
                                                  jc 00007F65E49401BEh
                                                  cmp dword ptr [004A9724h], 00000000h
                                                  je 00007F65E49401B5h
                                                  push edi
                                                  push esi
                                                  and edi, 0Fh
                                                  and esi, 0Fh
                                                  cmp edi, esi
                                                  pop esi
                                                  pop edi
                                                  jne 00007F65E49401A7h
                                                  jmp 00007F65E4940582h
                                                  test edi, 00000003h
                                                  jne 00007F65E49401B6h
                                                  shr ecx, 02h
                                                  and edx, 03h
                                                  cmp ecx, 08h
                                                  jc 00007F65E49401CBh
                                                  rep movsd
                                                  jmp dword ptr [00416740h+edx*4]
                                                  mov eax, edi
                                                  mov edx, 00000003h
                                                  sub ecx, 04h
                                                  jc 00007F65E49401AEh
                                                  and eax, 03h
                                                  add ecx, eax
                                                  jmp dword ptr [00416654h+eax*4]
                                                  jmp dword ptr [00416750h+ecx*4]
                                                  nop
                                                  jmp dword ptr [004166D4h+ecx*4]
                                                  nop
                                                  inc cx
                                                  add byte ptr [eax-4BFFBE9Ah], dl
                                                  inc cx
                                                  add byte ptr [ebx], ah
                                                  ror dword ptr [edx-75F877FAh], 1
                                                  inc esi
                                                  add dword ptr [eax+468A0147h], ecx
                                                  add al, cl
                                                  jmp 00007F65E6DB89A7h
                                                  add esi, 03h
                                                  add edi, 03h
                                                  cmp ecx, 08h
                                                  jc 00007F65E494016Eh
                                                  rep movsd
                                                  jmp dword ptr [00000000h+edx*4]
                                                  Programming Language:
                                                  • [ C ] VS2010 SP1 build 40219
                                                  • [C++] VS2010 SP1 build 40219
                                                  • [ C ] VS2008 SP1 build 30729
                                                  • [IMP] VS2008 SP1 build 30729
                                                  • [ASM] VS2010 SP1 build 40219
                                                  • [RES] VS2010 SP1 build 40219
                                                  • [LNK] VS2010 SP1 build 40219
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9328.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .rsrc0xab0000x93280x9400495451d7eb8326bd9fa2714869ea6de8False0.49002322635135137data5.541804843154628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                  RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                  RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                  RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
                                                  RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
                                                  RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
                                                  RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
                                                  RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
                                                  RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
                                                  RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
                                                  RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
                                                  RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
                                                  RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
                                                  RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
                                                  RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
                                                  RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
                                                  RT_STRING0xb28380x4d0dataEnglishGreat Britain0.36363636363636365
                                                  RT_STRING0xb2d080x5fcdataEnglishGreat Britain0.3087467362924282
                                                  RT_STRING0xb33080x65cdataEnglishGreat Britain0.34336609336609336
                                                  RT_STRING0xb39680x388dataEnglishGreat Britain0.377212389380531
                                                  RT_STRING0xb3cf00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                                                  RT_GROUP_ICON0xb3e480x84dataEnglishGreat Britain0.6439393939393939
                                                  RT_GROUP_ICON0xb3ed00x14dataEnglishGreat Britain1.15
                                                  RT_GROUP_ICON0xb3ee80x14dataEnglishGreat Britain1.25
                                                  RT_GROUP_ICON0xb3f000x14dataEnglishGreat Britain1.25
                                                  RT_VERSION0xb3f180x19cdataEnglishGreat Britain0.5339805825242718
                                                  RT_MANIFEST0xb40b80x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                                                  DLLImport
                                                  WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                                                  VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                                                  WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                  COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                                                  MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                                                  WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                                                  PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                                                  USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                                                  KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
                                                  USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
                                                  GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
                                                  COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                  ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
                                                  SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                  ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
                                                  OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
                                                  Language of compilation systemCountry where language is spokenMap
                                                  EnglishGreat Britain
                                                  EnglishUnited States
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Sep 25, 2024 11:06:27.146401882 CEST49705443192.168.2.7104.26.13.205
                                                  Sep 25, 2024 11:06:27.146434069 CEST44349705104.26.13.205192.168.2.7
                                                  Sep 25, 2024 11:06:27.146522999 CEST49705443192.168.2.7104.26.13.205
                                                  Sep 25, 2024 11:06:27.154506922 CEST49705443192.168.2.7104.26.13.205
                                                  Sep 25, 2024 11:06:27.154520988 CEST44349705104.26.13.205192.168.2.7
                                                  Sep 25, 2024 11:06:27.637866020 CEST44349705104.26.13.205192.168.2.7
                                                  Sep 25, 2024 11:06:27.637949944 CEST49705443192.168.2.7104.26.13.205
                                                  Sep 25, 2024 11:06:27.642479897 CEST49705443192.168.2.7104.26.13.205
                                                  Sep 25, 2024 11:06:27.642488956 CEST44349705104.26.13.205192.168.2.7
                                                  Sep 25, 2024 11:06:27.642781973 CEST44349705104.26.13.205192.168.2.7
                                                  Sep 25, 2024 11:06:27.685695887 CEST49705443192.168.2.7104.26.13.205
                                                  Sep 25, 2024 11:06:27.705813885 CEST49705443192.168.2.7104.26.13.205
                                                  Sep 25, 2024 11:06:27.747404099 CEST44349705104.26.13.205192.168.2.7
                                                  Sep 25, 2024 11:06:27.814609051 CEST44349705104.26.13.205192.168.2.7
                                                  Sep 25, 2024 11:06:27.814677954 CEST44349705104.26.13.205192.168.2.7
                                                  Sep 25, 2024 11:06:27.814758062 CEST49705443192.168.2.7104.26.13.205
                                                  Sep 25, 2024 11:06:27.824737072 CEST49705443192.168.2.7104.26.13.205
                                                  Sep 25, 2024 11:06:27.840440035 CEST4970680192.168.2.7208.95.112.1
                                                  Sep 25, 2024 11:06:27.845350027 CEST8049706208.95.112.1192.168.2.7
                                                  Sep 25, 2024 11:06:27.845424891 CEST4970680192.168.2.7208.95.112.1
                                                  Sep 25, 2024 11:06:27.845546961 CEST4970680192.168.2.7208.95.112.1
                                                  Sep 25, 2024 11:06:27.850344896 CEST8049706208.95.112.1192.168.2.7
                                                  Sep 25, 2024 11:06:28.305233002 CEST8049706208.95.112.1192.168.2.7
                                                  Sep 25, 2024 11:06:28.357587099 CEST4970680192.168.2.7208.95.112.1
                                                  Sep 25, 2024 11:06:28.940346003 CEST4970680192.168.2.7208.95.112.1
                                                  Sep 25, 2024 11:06:28.945772886 CEST8049706208.95.112.1192.168.2.7
                                                  Sep 25, 2024 11:06:28.946156025 CEST4970680192.168.2.7208.95.112.1
                                                  Sep 25, 2024 11:06:29.409513950 CEST49707587192.168.2.7216.194.161.167
                                                  Sep 25, 2024 11:06:29.414381027 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:29.414489031 CEST49707587192.168.2.7216.194.161.167
                                                  Sep 25, 2024 11:06:29.966247082 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:29.966516972 CEST49707587192.168.2.7216.194.161.167
                                                  Sep 25, 2024 11:06:29.971293926 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:30.124321938 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:30.124556065 CEST49707587192.168.2.7216.194.161.167
                                                  Sep 25, 2024 11:06:30.129446983 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:30.284398079 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:30.284912109 CEST49707587192.168.2.7216.194.161.167
                                                  Sep 25, 2024 11:06:30.289788961 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:30.453660965 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:30.453689098 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:30.453701019 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:30.453790903 CEST49707587192.168.2.7216.194.161.167
                                                  Sep 25, 2024 11:06:30.540378094 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:30.593799114 CEST49707587192.168.2.7216.194.161.167
                                                  Sep 25, 2024 11:06:30.593799114 CEST49707587192.168.2.7216.194.161.167
                                                  Sep 25, 2024 11:06:30.598628998 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:30.752013922 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:30.782527924 CEST49707587192.168.2.7216.194.161.167
                                                  Sep 25, 2024 11:06:30.787487030 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:30.940408945 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:30.982652903 CEST49707587192.168.2.7216.194.161.167
                                                  Sep 25, 2024 11:06:31.252609968 CEST49707587192.168.2.7216.194.161.167
                                                  Sep 25, 2024 11:06:31.257427931 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:31.410621881 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:31.411041975 CEST49707587192.168.2.7216.194.161.167
                                                  Sep 25, 2024 11:06:31.417642117 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:31.580030918 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:31.580318928 CEST49707587192.168.2.7216.194.161.167
                                                  Sep 25, 2024 11:06:31.585144043 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:31.738192081 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:31.738445044 CEST49707587192.168.2.7216.194.161.167
                                                  Sep 25, 2024 11:06:31.743244886 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:31.901576996 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:31.901835918 CEST49707587192.168.2.7216.194.161.167
                                                  Sep 25, 2024 11:06:31.906625032 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:32.059694052 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:32.061990023 CEST49707587192.168.2.7216.194.161.167
                                                  Sep 25, 2024 11:06:32.062077999 CEST49707587192.168.2.7216.194.161.167
                                                  Sep 25, 2024 11:06:32.062139988 CEST49707587192.168.2.7216.194.161.167
                                                  Sep 25, 2024 11:06:32.062175035 CEST49707587192.168.2.7216.194.161.167
                                                  Sep 25, 2024 11:06:32.062189102 CEST49707587192.168.2.7216.194.161.167
                                                  Sep 25, 2024 11:06:32.062213898 CEST49707587192.168.2.7216.194.161.167
                                                  Sep 25, 2024 11:06:32.062236071 CEST49707587192.168.2.7216.194.161.167
                                                  Sep 25, 2024 11:06:32.067802906 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:32.067815065 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:32.067825079 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:32.067835093 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:32.067845106 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:32.067853928 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:32.075479031 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:32.232784986 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:06:32.279480934 CEST49707587192.168.2.7216.194.161.167
                                                  Sep 25, 2024 11:08:08.967482090 CEST49707587192.168.2.7216.194.161.167
                                                  Sep 25, 2024 11:08:08.972995043 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:08:09.126892090 CEST58749707216.194.161.167192.168.2.7
                                                  Sep 25, 2024 11:08:09.129447937 CEST49707587192.168.2.7216.194.161.167
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Sep 25, 2024 11:06:17.469327927 CEST5474753192.168.2.71.1.1.1
                                                  Sep 25, 2024 11:06:27.133835077 CEST5773853192.168.2.71.1.1.1
                                                  Sep 25, 2024 11:06:27.140841961 CEST53577381.1.1.1192.168.2.7
                                                  Sep 25, 2024 11:06:27.830383062 CEST5168953192.168.2.71.1.1.1
                                                  Sep 25, 2024 11:06:27.839744091 CEST53516891.1.1.1192.168.2.7
                                                  Sep 25, 2024 11:06:28.940845013 CEST5438453192.168.2.71.1.1.1
                                                  Sep 25, 2024 11:06:29.408113956 CEST53543841.1.1.1192.168.2.7
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Sep 25, 2024 11:06:17.469327927 CEST192.168.2.71.1.1.10x416cStandard query (0)time.windows.comA (IP address)IN (0x0001)false
                                                  Sep 25, 2024 11:06:27.133835077 CEST192.168.2.71.1.1.10x963eStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                  Sep 25, 2024 11:06:27.830383062 CEST192.168.2.71.1.1.10xc0a1Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                  Sep 25, 2024 11:06:28.940845013 CEST192.168.2.71.1.1.10x4d1eStandard query (0)mail.laboratoriosvilla.com.mxA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Sep 25, 2024 11:06:17.476250887 CEST1.1.1.1192.168.2.70x416cNo error (0)time.windows.comtwc.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                                                  Sep 25, 2024 11:06:27.140841961 CEST1.1.1.1192.168.2.70x963eNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                  Sep 25, 2024 11:06:27.140841961 CEST1.1.1.1192.168.2.70x963eNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                  Sep 25, 2024 11:06:27.140841961 CEST1.1.1.1192.168.2.70x963eNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                  Sep 25, 2024 11:06:27.839744091 CEST1.1.1.1192.168.2.70xc0a1No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                  Sep 25, 2024 11:06:29.408113956 CEST1.1.1.1192.168.2.70x4d1eNo error (0)mail.laboratoriosvilla.com.mxlaboratoriosvilla.com.mxCNAME (Canonical name)IN (0x0001)false
                                                  Sep 25, 2024 11:06:29.408113956 CEST1.1.1.1192.168.2.70x4d1eNo error (0)laboratoriosvilla.com.mx216.194.161.167A (IP address)IN (0x0001)false
                                                  • api.ipify.org
                                                  • ip-api.com
                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.749706208.95.112.1807608C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                  TimestampBytes transferredDirectionData
                                                  Sep 25, 2024 11:06:27.845546961 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                                                  Host: ip-api.com
                                                  Connection: Keep-Alive
                                                  Sep 25, 2024 11:06:28.305233002 CEST175INHTTP/1.1 200 OK
                                                  Date: Wed, 25 Sep 2024 09:06:27 GMT
                                                  Content-Type: text/plain; charset=utf-8
                                                  Content-Length: 6
                                                  Access-Control-Allow-Origin: *
                                                  X-Ttl: 60
                                                  X-Rl: 44
                                                  Data Raw: 66 61 6c 73 65 0a
                                                  Data Ascii: false


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.749705104.26.13.2054437608C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                  TimestampBytes transferredDirectionData
                                                  2024-09-25 09:06:27 UTC155OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                  Host: api.ipify.org
                                                  Connection: Keep-Alive
                                                  2024-09-25 09:06:27 UTC211INHTTP/1.1 200 OK
                                                  Date: Wed, 25 Sep 2024 09:06:27 GMT
                                                  Content-Type: text/plain
                                                  Content-Length: 11
                                                  Connection: close
                                                  Vary: Origin
                                                  CF-Cache-Status: DYNAMIC
                                                  Server: cloudflare
                                                  CF-RAY: 8c89dbbb78a3c32e-EWR
                                                  2024-09-25 09:06:27 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                                                  Data Ascii: 8.46.123.33


                                                  TimestampSource PortDest PortSource IPDest IPCommands
                                                  Sep 25, 2024 11:06:29.966247082 CEST58749707216.194.161.167192.168.2.7220-server.aipssa.com.mx ESMTP Exim 4.96.2 #2 Wed, 25 Sep 2024 02:06:29 -0700
                                                  220-We do not authorize the use of this system to transport unsolicited,
                                                  220 and/or bulk e-mail.
                                                  Sep 25, 2024 11:06:29.966516972 CEST49707587192.168.2.7216.194.161.167EHLO 358075
                                                  Sep 25, 2024 11:06:30.124321938 CEST58749707216.194.161.167192.168.2.7250-server.aipssa.com.mx Hello 358075 [8.46.123.33]
                                                  250-SIZE 52428800
                                                  250-8BITMIME
                                                  250-PIPELINING
                                                  250-PIPECONNECT
                                                  250-AUTH PLAIN LOGIN
                                                  250-STARTTLS
                                                  250 HELP
                                                  Sep 25, 2024 11:06:30.124556065 CEST49707587192.168.2.7216.194.161.167STARTTLS
                                                  Sep 25, 2024 11:06:30.284398079 CEST58749707216.194.161.167192.168.2.7220 TLS go ahead

                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:05:06:22
                                                  Start date:25/09/2024
                                                  Path:C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe"
                                                  Imagebase:0x400000
                                                  File size:1'165'203 bytes
                                                  MD5 hash:0EEE7AF022B90B951F9284D4FADF88BE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1406244343.0000000003C50000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.1406244343.0000000003C50000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1406244343.0000000003C50000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.1406244343.0000000003C50000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:2
                                                  Start time:05:06:25
                                                  Start date:25/09/2024
                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe"
                                                  Imagebase:0x5c0000
                                                  File size:45'984 bytes
                                                  MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3834275846.00000000029DE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3833001951.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3833001951.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3834275846.00000000029B5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3834275846.00000000029B5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3834275846.00000000029F3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  Reputation:high
                                                  Has exited:false

                                                  Target ID:4
                                                  Start time:05:06:39
                                                  Start date:25/09/2024
                                                  Path:C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exe"
                                                  Imagebase:0x320000
                                                  File size:45'984 bytes
                                                  MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Antivirus matches:
                                                  • Detection: 0%, ReversingLabs
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:5
                                                  Start time:05:06:40
                                                  Start date:25/09/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff75da10000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:6
                                                  Start time:05:06:48
                                                  Start date:25/09/2024
                                                  Path:C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\AppData\Roaming\KaGeys\KaGeys.exe"
                                                  Imagebase:0xbf0000
                                                  File size:45'984 bytes
                                                  MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:7
                                                  Start time:05:06:48
                                                  Start date:25/09/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff75da10000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:3.5%
                                                    Dynamic/Decrypted Code Coverage:1.5%
                                                    Signature Coverage:7.2%
                                                    Total number of Nodes:2000
                                                    Total number of Limit Nodes:57
                                                    execution_graph 86092 4010e0 86095 401100 86092->86095 86094 4010f8 86096 401113 86095->86096 86097 401120 86096->86097 86098 401184 86096->86098 86099 40114c 86096->86099 86129 401182 86096->86129 86100 40112c DefWindowProcW 86097->86100 86154 401000 Shell_NotifyIconW __localtime64_s 86097->86154 86133 401250 86098->86133 86101 401151 86099->86101 86102 40119d 86099->86102 86100->86094 86106 401219 86101->86106 86107 40115d 86101->86107 86104 4011a3 86102->86104 86105 42afb4 86102->86105 86104->86097 86111 4011b6 KillTimer 86104->86111 86112 4011db SetTimer RegisterWindowMessageW 86104->86112 86149 40f190 10 API calls 86105->86149 86106->86097 86116 401225 86106->86116 86108 401163 86107->86108 86113 42b01d 86107->86113 86114 42afe9 86108->86114 86115 40116c 86108->86115 86148 401000 Shell_NotifyIconW __localtime64_s 86111->86148 86117 401193 86112->86117 86122 401204 CreatePopupMenu 86112->86122 86113->86100 86153 4370f4 52 API calls 86113->86153 86151 40f190 10 API calls 86114->86151 86115->86097 86124 401174 86115->86124 86156 468b0e 74 API calls __localtime64_s 86116->86156 86117->86094 86118 42b04f 86155 40e0c0 74 API calls __localtime64_s 86118->86155 86122->86094 86150 45fd57 65 API calls __localtime64_s 86124->86150 86126 42afe4 86126->86117 86127 42b00e 86152 401a50 337 API calls 86127->86152 86128 4011c9 PostQuitMessage 86128->86094 86129->86100 86132 42afdc 86132->86100 86132->86126 86134 401262 __localtime64_s 86133->86134 86135 4012e8 86133->86135 86157 401b80 86134->86157 86135->86117 86137 4012d1 KillTimer SetTimer 86137->86135 86138 40128c 86138->86137 86139 4012bb 86138->86139 86140 4272ec 86138->86140 86141 4012c5 86139->86141 86142 42733f 86139->86142 86143 4272f4 Shell_NotifyIconW 86140->86143 86144 42731a Shell_NotifyIconW 86140->86144 86141->86137 86145 427393 Shell_NotifyIconW 86141->86145 86146 427348 Shell_NotifyIconW 86142->86146 86147 42736e Shell_NotifyIconW 86142->86147 86143->86137 86144->86137 86145->86137 86146->86137 86147->86137 86148->86128 86149->86117 86150->86132 86151->86127 86152->86129 86153->86129 86154->86118 86155->86129 86156->86126 86158 401b9c 86157->86158 86178 401c7e 86157->86178 86179 4013c0 52 API calls 86158->86179 86160 401bac 86161 42722b LoadStringW 86160->86161 86162 401bb9 86160->86162 86164 427246 86161->86164 86180 402160 86162->86180 86194 40e0a0 52 API calls 86164->86194 86165 401bcd 86167 427258 86165->86167 86168 401bda 86165->86168 86195 40d200 52 API calls 2 library calls 86167->86195 86168->86164 86169 401be4 86168->86169 86193 40d200 52 API calls 2 library calls 86169->86193 86172 427267 86173 42727b 86172->86173 86175 401bf3 __localtime64_s _wcscpy _wcsncpy 86172->86175 86196 40d200 52 API calls 2 library calls 86173->86196 86177 401c62 Shell_NotifyIconW 86175->86177 86176 427289 86177->86178 86178->86138 86179->86160 86181 426daa 86180->86181 86182 40216b _wcslen 86180->86182 86210 40c600 86181->86210 86185 402180 86182->86185 86186 40219e 86182->86186 86184 426db5 86184->86165 86197 403bd0 52 API calls moneypunct 86185->86197 86198 4013a0 52 API calls 86186->86198 86189 402187 _memmove 86189->86165 86190 4021a5 86191 426db7 86190->86191 86199 4115d7 86190->86199 86193->86175 86194->86175 86195->86172 86196->86176 86197->86189 86198->86190 86201 4115e1 _malloc 86199->86201 86202 4115fb 86201->86202 86204 4115fd std::exception::exception 86201->86204 86215 4135bb 86201->86215 86202->86189 86208 41163b 86204->86208 86229 41130a 51 API calls __cinit 86204->86229 86205 411645 86231 418105 RaiseException 86205->86231 86230 4180af 46 API calls std::exception::operator= 86208->86230 86209 411656 86211 40c619 86210->86211 86212 40c60a 86210->86212 86211->86184 86212->86211 86238 4026f0 86212->86238 86214 426d7a _memmove 86214->86184 86216 413638 _malloc 86215->86216 86222 4135c9 _malloc 86215->86222 86237 417f77 46 API calls __getptd_noexit 86216->86237 86219 4135f7 RtlAllocateHeap 86219->86222 86228 413630 86219->86228 86221 413624 86235 417f77 46 API calls __getptd_noexit 86221->86235 86222->86219 86222->86221 86225 413622 86222->86225 86226 4135d4 86222->86226 86236 417f77 46 API calls __getptd_noexit 86225->86236 86226->86222 86232 418901 46 API calls 2 library calls 86226->86232 86233 418752 46 API calls 8 library calls 86226->86233 86234 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86226->86234 86228->86201 86229->86208 86230->86205 86231->86209 86232->86226 86233->86226 86235->86225 86236->86228 86237->86228 86239 426873 86238->86239 86240 4026ff 86238->86240 86245 4013a0 52 API calls 86239->86245 86240->86214 86242 42687b 86243 4115d7 52 API calls 86242->86243 86244 42689e _memmove 86243->86244 86244->86214 86245->86242 86246 40bd20 86247 428194 86246->86247 86248 40bd2d 86246->86248 86250 40bd43 86247->86250 86252 4281bc 86247->86252 86253 4281b2 86247->86253 86249 40bd37 86248->86249 86269 4531b1 85 API calls 5 library calls 86248->86269 86258 40bd50 86249->86258 86268 45e987 86 API calls moneypunct 86252->86268 86267 40b510 VariantClear 86253->86267 86257 4281ba 86259 426cf1 86258->86259 86260 40bd63 86258->86260 86279 44cde9 52 API calls _memmove 86259->86279 86270 40bd80 86260->86270 86263 40bd73 86263->86250 86264 426cfc 86280 40e0a0 52 API calls 86264->86280 86266 426d02 86267->86257 86268->86248 86269->86249 86271 40bd8e 86270->86271 86278 40bdb7 _memmove 86270->86278 86272 40bded 86271->86272 86273 40bdad 86271->86273 86271->86278 86274 4115d7 52 API calls 86272->86274 86281 402f00 86273->86281 86276 40bdf6 86274->86276 86277 4115d7 52 API calls 86276->86277 86276->86278 86277->86278 86278->86263 86279->86264 86280->86266 86282 402f0c 86281->86282 86283 402f10 86281->86283 86282->86278 86284 4115d7 52 API calls 86283->86284 86285 4268c3 86283->86285 86286 402f51 moneypunct _memmove 86284->86286 86286->86278 86287 425ba2 86292 40e360 86287->86292 86289 425bb4 86308 41130a 51 API calls __cinit 86289->86308 86291 425bbe 86293 4115d7 52 API calls 86292->86293 86294 40e3ec GetModuleFileNameW 86293->86294 86309 413a0e 86294->86309 86296 40e421 _wcsncat 86312 413a9e 86296->86312 86299 4115d7 52 API calls 86300 40e45e _wcscpy 86299->86300 86315 40bc70 86300->86315 86304 40e4a9 86304->86289 86305 40e4a1 _wcscat _wcslen _wcsncpy 86305->86304 86306 4115d7 52 API calls 86305->86306 86307 401c90 52 API calls 86305->86307 86306->86305 86307->86305 86308->86291 86334 413801 86309->86334 86364 419efd 86312->86364 86316 4115d7 52 API calls 86315->86316 86317 40bc98 86316->86317 86318 4115d7 52 API calls 86317->86318 86319 40bca6 86318->86319 86320 40e4c0 86319->86320 86376 403350 86320->86376 86322 40e4cb RegOpenKeyExW 86323 427190 RegQueryValueExW 86322->86323 86324 40e4eb 86322->86324 86325 4271b0 86323->86325 86326 42721a RegCloseKey 86323->86326 86324->86305 86327 4115d7 52 API calls 86325->86327 86326->86305 86328 4271cb 86327->86328 86383 43652f 52 API calls 86328->86383 86330 4271d8 RegQueryValueExW 86331 42720e 86330->86331 86332 4271f7 86330->86332 86331->86326 86333 402160 52 API calls 86332->86333 86333->86331 86335 41389e 86334->86335 86341 41381a 86334->86341 86336 4139e8 86335->86336 86338 413a00 86335->86338 86361 417f77 46 API calls __getptd_noexit 86336->86361 86363 417f77 46 API calls __getptd_noexit 86338->86363 86339 4139ed 86362 417f25 10 API calls __tsopen_nolock 86339->86362 86341->86335 86349 41388a 86341->86349 86356 419e30 46 API calls __tsopen_nolock 86341->86356 86344 41396c 86344->86335 86345 413967 86344->86345 86347 41397a 86344->86347 86345->86296 86346 413929 86346->86335 86348 413945 86346->86348 86358 419e30 46 API calls __tsopen_nolock 86346->86358 86360 419e30 46 API calls __tsopen_nolock 86347->86360 86348->86335 86348->86345 86352 41395b 86348->86352 86349->86335 86355 413909 86349->86355 86357 419e30 46 API calls __tsopen_nolock 86349->86357 86359 419e30 46 API calls __tsopen_nolock 86352->86359 86355->86344 86355->86346 86356->86349 86357->86355 86358->86348 86359->86345 86360->86345 86361->86339 86362->86345 86363->86345 86365 419f13 86364->86365 86366 419f0e 86364->86366 86373 417f77 46 API calls __getptd_noexit 86365->86373 86366->86365 86372 419f2b 86366->86372 86368 419f18 86374 417f25 10 API calls __tsopen_nolock 86368->86374 86371 40e454 86371->86299 86372->86371 86375 417f77 46 API calls __getptd_noexit 86372->86375 86373->86368 86374->86371 86375->86368 86377 403367 86376->86377 86378 403358 86376->86378 86379 4115d7 52 API calls 86377->86379 86378->86322 86380 403370 86379->86380 86381 4115d7 52 API calls 86380->86381 86382 40339e 86381->86382 86382->86322 86383->86330 86384 3fc74c8 86398 3fc5118 86384->86398 86386 3fc75b5 86401 3fc73b8 86386->86401 86404 3fc85d8 GetPEB 86398->86404 86400 3fc57a3 86400->86386 86402 3fc73c1 Sleep 86401->86402 86403 3fc73cf 86402->86403 86405 3fc8602 86404->86405 86405->86400 86406 416454 86443 416c70 86406->86443 86408 416460 GetStartupInfoW 86409 416474 86408->86409 86444 419d5a HeapCreate 86409->86444 86411 4164cd 86412 4164d8 86411->86412 86528 41642b 46 API calls 3 library calls 86411->86528 86445 417c20 GetModuleHandleW 86412->86445 86415 4164de 86416 4164e9 __RTC_Initialize 86415->86416 86529 41642b 46 API calls 3 library calls 86415->86529 86464 41aaa1 GetStartupInfoW 86416->86464 86420 416503 GetCommandLineW 86477 41f584 GetEnvironmentStringsW 86420->86477 86424 416513 86483 41f4d6 GetModuleFileNameW 86424->86483 86426 41651d 86427 416528 86426->86427 86531 411924 46 API calls 3 library calls 86426->86531 86487 41f2a4 86427->86487 86430 41652e 86431 416539 86430->86431 86532 411924 46 API calls 3 library calls 86430->86532 86501 411703 86431->86501 86434 416541 86436 41654c __wwincmdln 86434->86436 86533 411924 46 API calls 3 library calls 86434->86533 86505 40d6b0 86436->86505 86439 41657c 86535 411906 46 API calls _doexit 86439->86535 86442 416581 __tsopen_nolock 86443->86408 86444->86411 86446 417c34 86445->86446 86447 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 86445->86447 86536 4178ff 49 API calls _free 86446->86536 86449 417c87 TlsAlloc 86447->86449 86452 417cd5 TlsSetValue 86449->86452 86453 417d96 86449->86453 86450 417c39 86450->86415 86452->86453 86454 417ce6 __init_pointers 86452->86454 86453->86415 86537 418151 InitializeCriticalSectionAndSpinCount 86454->86537 86456 417d91 86545 4178ff 49 API calls _free 86456->86545 86458 417d2a 86458->86456 86538 416b49 86458->86538 86461 417d76 86544 41793c 46 API calls 4 library calls 86461->86544 86463 417d7e GetCurrentThreadId 86463->86453 86465 416b49 __calloc_crt 46 API calls 86464->86465 86466 41aabf 86465->86466 86467 41ac34 86466->86467 86469 416b49 __calloc_crt 46 API calls 86466->86469 86471 4164f7 86466->86471 86473 41abb4 86466->86473 86468 41ac6a GetStdHandle 86467->86468 86470 41acce SetHandleCount 86467->86470 86472 41ac7c GetFileType 86467->86472 86476 41aca2 InitializeCriticalSectionAndSpinCount 86467->86476 86468->86467 86469->86466 86470->86471 86471->86420 86530 411924 46 API calls 3 library calls 86471->86530 86472->86467 86473->86467 86474 41abe0 GetFileType 86473->86474 86475 41abeb InitializeCriticalSectionAndSpinCount 86473->86475 86474->86473 86474->86475 86475->86471 86475->86473 86476->86467 86476->86471 86478 41f595 86477->86478 86479 41f599 86477->86479 86478->86424 86555 416b04 86479->86555 86481 41f5bb _memmove 86482 41f5c2 FreeEnvironmentStringsW 86481->86482 86482->86424 86484 41f50b _wparse_cmdline 86483->86484 86485 416b04 __malloc_crt 46 API calls 86484->86485 86486 41f54e _wparse_cmdline 86484->86486 86485->86486 86486->86426 86488 41f2bc _wcslen 86487->86488 86492 41f2b4 86487->86492 86489 416b49 __calloc_crt 46 API calls 86488->86489 86494 41f2e0 _wcslen 86489->86494 86490 41f336 86562 413748 86490->86562 86492->86430 86493 416b49 __calloc_crt 46 API calls 86493->86494 86494->86490 86494->86492 86494->86493 86495 41f35c 86494->86495 86498 41f373 86494->86498 86561 41ef12 46 API calls __tsopen_nolock 86494->86561 86496 413748 _free 46 API calls 86495->86496 86496->86492 86568 417ed3 86498->86568 86500 41f37f 86500->86430 86502 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 86501->86502 86504 411750 __IsNonwritableInCurrentImage 86502->86504 86587 41130a 51 API calls __cinit 86502->86587 86504->86434 86506 42e2f3 86505->86506 86507 40d6cc 86505->86507 86588 408f40 86507->86588 86509 40d707 86592 40ebb0 86509->86592 86512 40d737 86595 411951 86512->86595 86517 40d751 86607 40f4e0 SystemParametersInfoW SystemParametersInfoW 86517->86607 86519 40d75f 86608 40d590 GetCurrentDirectoryW 86519->86608 86521 40d767 SystemParametersInfoW 86522 40d794 86521->86522 86523 40d78d FreeLibrary 86521->86523 86524 408f40 VariantClear 86522->86524 86523->86522 86525 40d79d 86524->86525 86526 408f40 VariantClear 86525->86526 86527 40d7a6 86526->86527 86527->86439 86534 4118da 46 API calls _doexit 86527->86534 86528->86412 86529->86416 86534->86439 86535->86442 86536->86450 86537->86458 86540 416b52 86538->86540 86541 416b8f 86540->86541 86542 416b70 Sleep 86540->86542 86546 41f677 86540->86546 86541->86456 86541->86461 86543 416b85 86542->86543 86543->86540 86543->86541 86544->86463 86545->86453 86547 41f683 86546->86547 86552 41f69e _malloc 86546->86552 86548 41f68f 86547->86548 86547->86552 86554 417f77 46 API calls __getptd_noexit 86548->86554 86550 41f6b1 HeapAlloc 86551 41f6d8 86550->86551 86550->86552 86551->86540 86552->86550 86552->86551 86553 41f694 86553->86540 86554->86553 86558 416b0d 86555->86558 86556 4135bb _malloc 45 API calls 86556->86558 86557 416b43 86557->86481 86558->86556 86558->86557 86559 416b24 Sleep 86558->86559 86560 416b39 86559->86560 86560->86557 86560->86558 86561->86494 86563 41377c __dosmaperr 86562->86563 86564 413753 RtlFreeHeap 86562->86564 86563->86492 86564->86563 86565 413768 86564->86565 86571 417f77 46 API calls __getptd_noexit 86565->86571 86567 41376e GetLastError 86567->86563 86572 417daa 86568->86572 86571->86567 86573 417dc9 __localtime64_s __call_reportfault 86572->86573 86574 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 86573->86574 86577 417eb5 __call_reportfault 86574->86577 86576 417ed1 GetCurrentProcess TerminateProcess 86576->86500 86578 41a208 86577->86578 86579 41a210 86578->86579 86580 41a212 IsDebuggerPresent 86578->86580 86579->86576 86586 41fe19 86580->86586 86583 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 86584 421ff0 __call_reportfault 86583->86584 86585 421ff8 GetCurrentProcess TerminateProcess 86583->86585 86584->86585 86585->86576 86586->86583 86587->86504 86589 408f48 moneypunct 86588->86589 86590 4265c7 VariantClear 86589->86590 86591 408f55 moneypunct 86589->86591 86590->86591 86591->86509 86648 40ebd0 86592->86648 86652 4182cb 86595->86652 86597 41195e 86659 4181f2 LeaveCriticalSection 86597->86659 86599 40d748 86600 4119b0 86599->86600 86601 4119d6 86600->86601 86602 4119bc 86600->86602 86601->86517 86602->86601 86694 417f77 46 API calls __getptd_noexit 86602->86694 86604 4119c6 86695 417f25 10 API calls __tsopen_nolock 86604->86695 86606 4119d1 86606->86517 86607->86519 86696 401f20 86608->86696 86610 40d5b6 IsDebuggerPresent 86611 40d5c4 86610->86611 86612 42e1bb MessageBoxA 86610->86612 86613 42e1d4 86611->86613 86614 40d5e3 86611->86614 86612->86613 86869 403a50 52 API calls 3 library calls 86613->86869 86766 40f520 86614->86766 86618 40d5fd GetFullPathNameW 86778 401460 86618->86778 86620 40d63b 86621 40d643 86620->86621 86623 42e231 SetCurrentDirectoryW 86620->86623 86622 40d64c 86621->86622 86870 432fee 6 API calls 86621->86870 86793 410390 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 86622->86793 86623->86621 86626 42e252 86626->86622 86628 42e25a GetModuleFileNameW 86626->86628 86630 42e274 86628->86630 86631 42e2cb GetForegroundWindow ShellExecuteW 86628->86631 86871 401b10 86630->86871 86635 40d688 86631->86635 86632 40d656 86634 40d669 86632->86634 86867 40e0c0 74 API calls __localtime64_s 86632->86867 86801 4091e0 86634->86801 86639 40d692 SetCurrentDirectoryW 86635->86639 86639->86521 86642 42e28d 86878 40d200 52 API calls 2 library calls 86642->86878 86645 42e299 GetForegroundWindow ShellExecuteW 86646 42e2c6 86645->86646 86646->86635 86647 40ec00 LoadLibraryA GetProcAddress 86647->86512 86649 40d72e 86648->86649 86650 40ebd6 LoadLibraryA 86648->86650 86649->86512 86649->86647 86650->86649 86651 40ebe7 GetProcAddress 86650->86651 86651->86649 86653 4182e0 86652->86653 86654 4182f3 EnterCriticalSection 86652->86654 86660 418209 86653->86660 86654->86597 86656 4182e6 86656->86654 86687 411924 46 API calls 3 library calls 86656->86687 86659->86599 86661 418215 __tsopen_nolock 86660->86661 86662 418225 86661->86662 86663 41823d 86661->86663 86688 418901 46 API calls 2 library calls 86662->86688 86665 416b04 __malloc_crt 45 API calls 86663->86665 86671 41824b __tsopen_nolock 86663->86671 86667 418256 86665->86667 86666 41822a 86689 418752 46 API calls 8 library calls 86666->86689 86669 41825d 86667->86669 86670 41826c 86667->86670 86691 417f77 46 API calls __getptd_noexit 86669->86691 86675 4182cb __lock 45 API calls 86670->86675 86671->86656 86672 418231 86690 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86672->86690 86677 418273 86675->86677 86678 4182a6 86677->86678 86679 41827b InitializeCriticalSectionAndSpinCount 86677->86679 86680 413748 _free 45 API calls 86678->86680 86681 418297 86679->86681 86682 41828b 86679->86682 86680->86681 86693 4182c2 LeaveCriticalSection _doexit 86681->86693 86683 413748 _free 45 API calls 86682->86683 86684 418291 86683->86684 86692 417f77 46 API calls __getptd_noexit 86684->86692 86688->86666 86689->86672 86691->86671 86692->86681 86693->86671 86694->86604 86695->86606 86879 40e6e0 86696->86879 86700 401f41 GetModuleFileNameW 86897 410100 86700->86897 86702 401f5c 86909 410960 86702->86909 86705 401b10 52 API calls 86706 401f81 86705->86706 86912 401980 86706->86912 86708 401f8e 86709 408f40 VariantClear 86708->86709 86710 401f9d 86709->86710 86711 401b10 52 API calls 86710->86711 86712 401fb4 86711->86712 86713 401980 53 API calls 86712->86713 86714 401fc3 86713->86714 86715 401b10 52 API calls 86714->86715 86716 401fd2 86715->86716 86920 40c2c0 86716->86920 86718 401fe1 86719 40bc70 52 API calls 86718->86719 86720 401ff3 86719->86720 86938 401a10 86720->86938 86722 401ffe 86945 4114ab 86722->86945 86725 428b05 86727 401a10 52 API calls 86725->86727 86726 402017 86728 4114ab __wcsicoll 58 API calls 86726->86728 86729 428b18 86727->86729 86730 402022 86728->86730 86732 401a10 52 API calls 86729->86732 86730->86729 86731 40202d 86730->86731 86733 4114ab __wcsicoll 58 API calls 86731->86733 86734 428b33 86732->86734 86735 402038 86733->86735 86737 428b3b GetModuleFileNameW 86734->86737 86736 402043 86735->86736 86735->86737 86738 4114ab __wcsicoll 58 API calls 86736->86738 86739 401a10 52 API calls 86737->86739 86740 40204e 86738->86740 86741 428b6c 86739->86741 86742 402092 86740->86742 86747 401a10 52 API calls 86740->86747 86749 428b90 _wcscpy 86740->86749 86957 40e0a0 52 API calls 86741->86957 86744 4020a3 86742->86744 86742->86749 86746 428bc6 86744->86746 86953 40e830 53 API calls 86744->86953 86745 428b7a 86748 401a10 52 API calls 86745->86748 86751 402073 _wcscpy 86747->86751 86752 428b88 86748->86752 86753 401a10 52 API calls 86749->86753 86757 401a10 52 API calls 86751->86757 86752->86749 86761 4020d0 86753->86761 86754 4020bb 86954 40cf00 53 API calls 86754->86954 86756 4020c6 86758 408f40 VariantClear 86756->86758 86757->86742 86758->86761 86759 402110 86763 408f40 VariantClear 86759->86763 86761->86759 86764 401a10 52 API calls 86761->86764 86955 40cf00 53 API calls 86761->86955 86956 40e6a0 53 API calls 86761->86956 86765 402120 moneypunct 86763->86765 86764->86761 86765->86610 86767 4295c9 __localtime64_s 86766->86767 86768 40f53c 86766->86768 86771 4295d9 GetOpenFileNameW 86767->86771 87653 410120 86768->87653 86770 40f545 87657 4102b0 SHGetMalloc 86770->87657 86771->86768 86774 40d5f5 86771->86774 86773 40f54c 87662 410190 GetFullPathNameW 86773->87662 86774->86618 86774->86620 86776 40f559 87673 40f570 86776->87673 87729 402400 86778->87729 86780 40146f 86783 428c29 _wcscat 86780->86783 87738 401500 86780->87738 86782 40147c 86782->86783 87746 40d440 86782->87746 86785 401489 86785->86783 86786 401491 GetFullPathNameW 86785->86786 86787 402160 52 API calls 86786->86787 86788 4014bb 86787->86788 86789 402160 52 API calls 86788->86789 86790 4014c8 86789->86790 86790->86783 86791 402160 52 API calls 86790->86791 86792 4014ee 86791->86792 86792->86620 86794 428361 86793->86794 86795 4103fc LoadImageW RegisterClassExW 86793->86795 87818 44395e EnumResourceNamesW LoadImageW 86794->87818 87817 410490 7 API calls 86795->87817 86798 40d651 86800 410570 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 86798->86800 86799 428368 86800->86632 86802 409202 86801->86802 86803 42d7ad 86801->86803 86847 409216 moneypunct 86802->86847 88090 410940 337 API calls 86802->88090 88093 45e737 90 API calls 3 library calls 86803->88093 86806 409386 86807 40939c 86806->86807 88091 40f190 10 API calls 86806->88091 86807->86635 86868 401000 Shell_NotifyIconW __localtime64_s 86807->86868 86809 4095b2 86809->86807 86810 4095bf 86809->86810 88092 401a50 337 API calls 86810->88092 86811 409253 PeekMessageW 86811->86847 86813 42d8cd Sleep 86813->86847 86814 4095c6 LockWindowUpdate DestroyWindow GetMessageW 86814->86807 86817 4095f9 86814->86817 86816 42e13b 88112 40d410 VariantClear 86816->88112 86819 42e158 TranslateMessage DispatchMessageW GetMessageW 86817->86819 86819->86819 86822 42e188 86819->86822 86821 409567 PeekMessageW 86821->86847 86822->86807 86825 46f3c1 107 API calls 86825->86847 86827 46fdbf 108 API calls 86849 4094e0 86827->86849 86828 409551 TranslateMessage DispatchMessageW 86828->86821 86830 42dcd2 WaitForSingleObject 86833 42dcf0 GetExitCodeProcess CloseHandle 86830->86833 86830->86847 86831 44c29d 52 API calls 86831->86849 86832 42dd3d Sleep 86832->86849 88101 40d410 VariantClear 86833->88101 86837 4094cf Sleep 86837->86849 86839 40d410 VariantClear 86839->86847 86840 408f40 VariantClear 86840->86849 86842 42d94d timeGetTime 88097 465124 53 API calls 86842->88097 86843 40c620 timeGetTime 86843->86849 86846 465124 53 API calls 86846->86849 86847->86806 86847->86811 86847->86813 86847->86816 86847->86821 86847->86825 86847->86828 86847->86830 86847->86832 86847->86837 86847->86839 86847->86842 86848 47d33e 315 API calls 86847->86848 86847->86849 86858 45e737 90 API calls 86847->86858 86861 42e0cc VariantClear 86847->86861 86862 408f40 VariantClear 86847->86862 87819 4091b0 86847->87819 87877 40afa0 86847->87877 87903 408fc0 86847->87903 87938 408cc0 86847->87938 87952 40d150 86847->87952 87957 40d170 86847->87957 87963 4096a0 86847->87963 88094 465124 53 API calls 86847->88094 88095 40e0a0 52 API calls 86847->88095 88096 40c620 timeGetTime 86847->88096 88111 40e270 VariantClear moneypunct 86847->88111 86848->86847 86849->86827 86849->86831 86849->86840 86849->86843 86849->86846 86849->86847 86850 42dd89 CloseHandle 86849->86850 86852 42de19 GetExitCodeProcess CloseHandle 86849->86852 86855 42de88 Sleep 86849->86855 86863 401b10 52 API calls 86849->86863 86865 401980 53 API calls 86849->86865 88098 45178a 54 API calls 86849->88098 88099 47d33e 337 API calls 86849->88099 88100 453bc6 54 API calls 86849->88100 88102 40d410 VariantClear 86849->88102 88103 443d19 67 API calls _wcslen 86849->88103 88104 4574b4 VariantClear 86849->88104 88105 403cd0 86849->88105 88109 4731e1 VariantClear 86849->88109 88110 4331a2 6 API calls 86849->88110 86850->86849 86852->86849 86855->86847 86858->86847 86861->86847 86862->86847 86863->86849 86865->86849 86867->86634 86868->86635 86869->86620 86870->86626 86872 401b16 _wcslen 86871->86872 86873 4115d7 52 API calls 86872->86873 86876 401b63 86872->86876 86874 401b4b _memmove 86873->86874 86875 4115d7 52 API calls 86874->86875 86875->86876 86877 40d200 52 API calls 2 library calls 86876->86877 86877->86642 86878->86645 86880 40bc70 52 API calls 86879->86880 86881 401f31 86880->86881 86882 402560 86881->86882 86883 40256d __write_nolock 86882->86883 86884 402160 52 API calls 86883->86884 86886 402593 86884->86886 86890 4025bd 86886->86890 86958 401c90 86886->86958 86887 4026f0 52 API calls 86887->86890 86888 4026db 86888->86700 86889 4026a7 86889->86888 86891 401b10 52 API calls 86889->86891 86890->86887 86890->86889 86892 401b10 52 API calls 86890->86892 86895 401c90 52 API calls 86890->86895 86961 40d7c0 52 API calls 2 library calls 86890->86961 86893 4026d1 86891->86893 86892->86890 86962 40d7c0 52 API calls 2 library calls 86893->86962 86895->86890 86963 40f760 86897->86963 86900 410118 86900->86702 86902 42805d 86903 42806a 86902->86903 87019 431e58 86902->87019 86905 413748 _free 46 API calls 86903->86905 86906 428078 86905->86906 86907 431e58 82 API calls 86906->86907 86908 428084 86907->86908 86908->86702 86910 4115d7 52 API calls 86909->86910 86911 401f74 86910->86911 86911->86705 86913 4019a3 86912->86913 86919 401985 86912->86919 86914 4019b8 86913->86914 86913->86919 87642 403e10 53 API calls 86914->87642 86916 40199f 86916->86708 86918 4019c4 86918->86708 86919->86916 87641 403e10 53 API calls 86919->87641 86921 40c2c7 86920->86921 86922 40c30e 86920->86922 86923 40c2d3 86921->86923 86924 426c79 86921->86924 86925 40c315 86922->86925 86926 426c2b 86922->86926 87643 403ea0 52 API calls __cinit 86923->87643 87648 4534e3 52 API calls 86924->87648 86930 40c321 86925->86930 86931 426c5a 86925->86931 86928 426c4b 86926->86928 86929 426c2e 86926->86929 87646 4534e3 52 API calls 86928->87646 86937 40c2de 86929->86937 87645 4534e3 52 API calls 86929->87645 87644 403ea0 52 API calls __cinit 86930->87644 87647 4534e3 52 API calls 86931->87647 86937->86718 86937->86937 86939 401a30 86938->86939 86940 401a17 86938->86940 86942 402160 52 API calls 86939->86942 86941 401a2d 86940->86941 87649 403c30 52 API calls _memmove 86940->87649 86941->86722 86944 401a3d 86942->86944 86944->86722 86946 411523 86945->86946 86947 4114ba 86945->86947 87652 4113a8 58 API calls 3 library calls 86946->87652 86952 40200c 86947->86952 87650 417f77 46 API calls __getptd_noexit 86947->87650 86950 4114c6 87651 417f25 10 API calls __tsopen_nolock 86950->87651 86952->86725 86952->86726 86953->86754 86954->86756 86955->86761 86956->86761 86957->86745 86959 4026f0 52 API calls 86958->86959 86960 401c97 86959->86960 86960->86886 86961->86890 86962->86888 87023 40f6f0 86963->87023 86965 40f77b _strcat moneypunct 87031 40f850 86965->87031 86970 427c2a 87060 414d04 86970->87060 86972 40f7fc 86972->86970 86973 40f804 86972->86973 87047 414a46 86973->87047 86977 40f80e 86977->86900 86982 4528bd 86977->86982 86979 427c59 87066 414fe2 86979->87066 86981 427c79 86983 4150d1 _fseek 81 API calls 86982->86983 86984 452930 86983->86984 87566 452719 86984->87566 86987 452948 86987->86902 86988 414d04 __fread_nolock 61 API calls 86989 452966 86988->86989 86990 414d04 __fread_nolock 61 API calls 86989->86990 86991 452976 86990->86991 86992 414d04 __fread_nolock 61 API calls 86991->86992 86993 45298f 86992->86993 86994 414d04 __fread_nolock 61 API calls 86993->86994 86995 4529aa 86994->86995 86996 4150d1 _fseek 81 API calls 86995->86996 86997 4529c4 86996->86997 86998 4135bb _malloc 46 API calls 86997->86998 86999 4529cf 86998->86999 87000 4135bb _malloc 46 API calls 86999->87000 87001 4529db 87000->87001 87002 414d04 __fread_nolock 61 API calls 87001->87002 87003 4529ec 87002->87003 87004 44afef GetSystemTimeAsFileTime 87003->87004 87005 452a00 87004->87005 87006 452a36 87005->87006 87007 452a13 87005->87007 87008 452aa5 87006->87008 87009 452a3c 87006->87009 87010 413748 _free 46 API calls 87007->87010 87012 413748 _free 46 API calls 87008->87012 87572 44b1a9 87009->87572 87013 452a1c 87010->87013 87015 452aa3 87012->87015 87016 413748 _free 46 API calls 87013->87016 87014 452a9d 87017 413748 _free 46 API calls 87014->87017 87015->86902 87018 452a25 87016->87018 87017->87015 87018->86902 87020 431e64 87019->87020 87021 431e6a 87019->87021 87022 414a46 __fcloseall 82 API calls 87020->87022 87021->86903 87022->87021 87024 425de2 87023->87024 87025 40f6fc _wcslen 87023->87025 87024->86965 87026 40f710 WideCharToMultiByte 87025->87026 87027 40f756 87026->87027 87028 40f728 87026->87028 87027->86965 87029 4115d7 52 API calls 87028->87029 87030 40f735 WideCharToMultiByte 87029->87030 87030->86965 87033 40f85d __localtime64_s _strlen 87031->87033 87034 40f7ab 87033->87034 87079 414db8 87033->87079 87035 4149c2 87034->87035 87094 414904 87035->87094 87037 40f7e9 87037->86970 87038 40f5c0 87037->87038 87043 40f5cd _strcat __write_nolock _memmove 87038->87043 87039 414d04 __fread_nolock 61 API calls 87039->87043 87041 425d11 87042 4150d1 _fseek 81 API calls 87041->87042 87044 425d33 87042->87044 87043->87039 87043->87041 87046 40f691 __tzset_nolock 87043->87046 87182 4150d1 87043->87182 87045 414d04 __fread_nolock 61 API calls 87044->87045 87045->87046 87046->86972 87048 414a52 __tsopen_nolock 87047->87048 87049 414a64 87048->87049 87050 414a79 87048->87050 87322 417f77 46 API calls __getptd_noexit 87049->87322 87053 415471 __lock_file 47 API calls 87050->87053 87057 414a74 __tsopen_nolock 87050->87057 87052 414a69 87323 417f25 10 API calls __tsopen_nolock 87052->87323 87055 414a92 87053->87055 87306 4149d9 87055->87306 87057->86977 87391 414c76 87060->87391 87062 414d1c 87063 44afef 87062->87063 87559 442c5a 87063->87559 87065 44b00d 87065->86979 87067 414fee __tsopen_nolock 87066->87067 87068 414ffa 87067->87068 87069 41500f 87067->87069 87563 417f77 46 API calls __getptd_noexit 87068->87563 87070 415471 __lock_file 47 API calls 87069->87070 87073 415017 87070->87073 87072 414fff 87564 417f25 10 API calls __tsopen_nolock 87072->87564 87075 414e4e __ftell_nolock 51 API calls 87073->87075 87076 415024 87075->87076 87565 41503d LeaveCriticalSection LeaveCriticalSection _fseek 87076->87565 87078 41500a __tsopen_nolock 87078->86981 87080 414dd6 87079->87080 87081 414deb 87079->87081 87090 417f77 46 API calls __getptd_noexit 87080->87090 87081->87080 87083 414df2 87081->87083 87092 41b91b 79 API calls 11 library calls 87083->87092 87084 414ddb 87091 417f25 10 API calls __tsopen_nolock 87084->87091 87087 414e18 87089 414de6 87087->87089 87093 418f98 77 API calls 6 library calls 87087->87093 87089->87033 87090->87084 87091->87089 87092->87087 87093->87089 87096 414910 __tsopen_nolock 87094->87096 87095 414923 87150 417f77 46 API calls __getptd_noexit 87095->87150 87096->87095 87099 414951 87096->87099 87098 414928 87151 417f25 10 API calls __tsopen_nolock 87098->87151 87113 41d4d1 87099->87113 87102 414956 87103 41496a 87102->87103 87104 41495d 87102->87104 87106 414992 87103->87106 87107 414972 87103->87107 87152 417f77 46 API calls __getptd_noexit 87104->87152 87130 41d218 87106->87130 87153 417f77 46 API calls __getptd_noexit 87107->87153 87109 414933 __tsopen_nolock @_EH4_CallFilterFunc@8 87109->87037 87114 41d4dd __tsopen_nolock 87113->87114 87115 4182cb __lock 46 API calls 87114->87115 87128 41d4eb 87115->87128 87116 41d560 87155 41d5fb 87116->87155 87117 41d567 87118 416b04 __malloc_crt 46 API calls 87117->87118 87120 41d56e 87118->87120 87120->87116 87122 41d57c InitializeCriticalSectionAndSpinCount 87120->87122 87121 41d5f0 __tsopen_nolock 87121->87102 87123 41d59c 87122->87123 87124 41d5af EnterCriticalSection 87122->87124 87127 413748 _free 46 API calls 87123->87127 87124->87116 87125 418209 __mtinitlocknum 46 API calls 87125->87128 87127->87116 87128->87116 87128->87117 87128->87125 87158 4154b2 47 API calls __lock 87128->87158 87159 415520 LeaveCriticalSection LeaveCriticalSection _doexit 87128->87159 87131 41d23a 87130->87131 87132 41d255 87131->87132 87143 41d26c __wopenfile 87131->87143 87164 417f77 46 API calls __getptd_noexit 87132->87164 87134 41d25a 87165 417f25 10 API calls __tsopen_nolock 87134->87165 87136 41d47a 87169 417f77 46 API calls __getptd_noexit 87136->87169 87137 41d48c 87161 422bf9 87137->87161 87139 41499d 87154 4149b8 LeaveCriticalSection LeaveCriticalSection _fseek 87139->87154 87141 41d47f 87170 417f25 10 API calls __tsopen_nolock 87141->87170 87143->87136 87149 41d421 87143->87149 87166 41341f 58 API calls 2 library calls 87143->87166 87145 41d41a 87145->87149 87167 41341f 58 API calls 2 library calls 87145->87167 87147 41d439 87147->87149 87168 41341f 58 API calls 2 library calls 87147->87168 87149->87136 87149->87137 87150->87098 87151->87109 87152->87109 87153->87109 87154->87109 87160 4181f2 LeaveCriticalSection 87155->87160 87157 41d602 87157->87121 87158->87128 87159->87128 87160->87157 87171 422b35 87161->87171 87163 422c14 87163->87139 87164->87134 87165->87139 87166->87145 87167->87147 87168->87149 87169->87141 87170->87139 87173 422b41 __tsopen_nolock 87171->87173 87172 422b54 87174 417f77 __tsopen_nolock 46 API calls 87172->87174 87173->87172 87175 422b8a 87173->87175 87176 422b59 87174->87176 87177 422400 __tsopen_nolock 109 API calls 87175->87177 87178 417f25 __tsopen_nolock 10 API calls 87176->87178 87179 422ba4 87177->87179 87181 422b63 __tsopen_nolock 87178->87181 87180 422bcb __wsopen_helper LeaveCriticalSection 87179->87180 87180->87181 87181->87163 87184 4150dd __tsopen_nolock 87182->87184 87183 4150e9 87213 417f77 46 API calls __getptd_noexit 87183->87213 87184->87183 87185 41510f 87184->87185 87195 415471 87185->87195 87188 4150ee 87214 417f25 10 API calls __tsopen_nolock 87188->87214 87194 4150f9 __tsopen_nolock 87194->87043 87196 415483 87195->87196 87197 4154a5 EnterCriticalSection 87195->87197 87196->87197 87198 41548b 87196->87198 87199 415117 87197->87199 87200 4182cb __lock 46 API calls 87198->87200 87201 415047 87199->87201 87200->87199 87202 415057 87201->87202 87204 415067 87201->87204 87271 417f77 46 API calls __getptd_noexit 87202->87271 87203 415079 87233 41443c 87203->87233 87204->87203 87216 414e4e 87204->87216 87208 41505c 87215 415143 LeaveCriticalSection LeaveCriticalSection _fseek 87208->87215 87211 4150b9 87246 41e1f4 87211->87246 87213->87188 87214->87194 87215->87194 87217 414e61 87216->87217 87218 414e79 87216->87218 87272 417f77 46 API calls __getptd_noexit 87217->87272 87220 414139 __flswbuf 46 API calls 87218->87220 87222 414e80 87220->87222 87221 414e66 87273 417f25 10 API calls __tsopen_nolock 87221->87273 87224 41e1f4 __write 51 API calls 87222->87224 87225 414e97 87224->87225 87226 414f09 87225->87226 87228 414ec9 87225->87228 87232 414e71 87225->87232 87274 417f77 46 API calls __getptd_noexit 87226->87274 87229 41e1f4 __write 51 API calls 87228->87229 87228->87232 87230 414f64 87229->87230 87231 41e1f4 __write 51 API calls 87230->87231 87230->87232 87231->87232 87232->87203 87234 414455 87233->87234 87238 414477 87233->87238 87235 414139 __flswbuf 46 API calls 87234->87235 87234->87238 87236 414470 87235->87236 87275 41b7b2 77 API calls 4 library calls 87236->87275 87239 414139 87238->87239 87240 414145 87239->87240 87241 41415a 87239->87241 87276 417f77 46 API calls __getptd_noexit 87240->87276 87241->87211 87243 41414a 87277 417f25 10 API calls __tsopen_nolock 87243->87277 87245 414155 87245->87211 87247 41e200 __tsopen_nolock 87246->87247 87248 41e208 87247->87248 87249 41e223 87247->87249 87298 417f8a 46 API calls __getptd_noexit 87248->87298 87250 41e22f 87249->87250 87255 41e269 87249->87255 87300 417f8a 46 API calls __getptd_noexit 87250->87300 87253 41e20d 87299 417f77 46 API calls __getptd_noexit 87253->87299 87254 41e234 87301 417f77 46 API calls __getptd_noexit 87254->87301 87278 41ae56 87255->87278 87259 41e23c 87302 417f25 10 API calls __tsopen_nolock 87259->87302 87260 41e26f 87262 41e291 87260->87262 87263 41e27d 87260->87263 87303 417f77 46 API calls __getptd_noexit 87262->87303 87288 41e17f 87263->87288 87265 41e215 __tsopen_nolock 87265->87208 87267 41e289 87305 41e2c0 LeaveCriticalSection __unlock_fhandle 87267->87305 87268 41e296 87304 417f8a 46 API calls __getptd_noexit 87268->87304 87271->87208 87272->87221 87273->87232 87274->87232 87275->87238 87276->87243 87277->87245 87279 41ae62 __tsopen_nolock 87278->87279 87280 41aebc 87279->87280 87281 4182cb __lock 46 API calls 87279->87281 87282 41aec1 EnterCriticalSection 87280->87282 87283 41aede __tsopen_nolock 87280->87283 87284 41ae8e 87281->87284 87282->87283 87283->87260 87285 41aeaa 87284->87285 87286 41ae97 InitializeCriticalSectionAndSpinCount 87284->87286 87287 41aeec ___lock_fhandle LeaveCriticalSection 87285->87287 87286->87285 87287->87280 87289 41aded __commit 46 API calls 87288->87289 87290 41e18e 87289->87290 87291 41e1a4 SetFilePointer 87290->87291 87292 41e194 87290->87292 87294 41e1bb GetLastError 87291->87294 87296 41e1c3 87291->87296 87293 417f77 __tsopen_nolock 46 API calls 87292->87293 87295 41e199 87293->87295 87294->87296 87295->87267 87296->87295 87297 417f9d __dosmaperr 46 API calls 87296->87297 87297->87295 87298->87253 87299->87265 87300->87254 87301->87259 87302->87265 87303->87268 87304->87267 87305->87265 87307 4149ea 87306->87307 87308 4149fe 87306->87308 87352 417f77 46 API calls __getptd_noexit 87307->87352 87310 41443c __flush 77 API calls 87308->87310 87315 4149fa 87308->87315 87312 414a0a 87310->87312 87311 4149ef 87353 417f25 10 API calls __tsopen_nolock 87311->87353 87325 41d8c2 87312->87325 87324 414ab2 LeaveCriticalSection LeaveCriticalSection _fseek 87315->87324 87317 414139 __flswbuf 46 API calls 87318 414a18 87317->87318 87329 41d7fe 87318->87329 87320 414a1e 87320->87315 87321 413748 _free 46 API calls 87320->87321 87321->87315 87322->87052 87323->87057 87324->87057 87326 41d8d2 87325->87326 87328 414a12 87325->87328 87327 413748 _free 46 API calls 87326->87327 87326->87328 87327->87328 87328->87317 87330 41d80a __tsopen_nolock 87329->87330 87331 41d812 87330->87331 87332 41d82d 87330->87332 87369 417f8a 46 API calls __getptd_noexit 87331->87369 87333 41d839 87332->87333 87338 41d873 87332->87338 87371 417f8a 46 API calls __getptd_noexit 87333->87371 87336 41d817 87370 417f77 46 API calls __getptd_noexit 87336->87370 87337 41d83e 87372 417f77 46 API calls __getptd_noexit 87337->87372 87341 41ae56 ___lock_fhandle 48 API calls 87338->87341 87344 41d879 87341->87344 87342 41d81f __tsopen_nolock 87342->87320 87343 41d846 87373 417f25 10 API calls __tsopen_nolock 87343->87373 87346 41d893 87344->87346 87347 41d887 87344->87347 87374 417f77 46 API calls __getptd_noexit 87346->87374 87354 41d762 87347->87354 87350 41d88d 87375 41d8ba LeaveCriticalSection __unlock_fhandle 87350->87375 87352->87311 87353->87315 87376 41aded 87354->87376 87356 41d7c8 87389 41ad67 47 API calls __tsopen_nolock 87356->87389 87358 41d772 87358->87356 87359 41aded __commit 46 API calls 87358->87359 87368 41d7a6 87358->87368 87361 41d79d 87359->87361 87360 41aded __commit 46 API calls 87362 41d7b2 CloseHandle 87360->87362 87365 41aded __commit 46 API calls 87361->87365 87362->87356 87366 41d7be GetLastError 87362->87366 87363 41d7f2 87363->87350 87364 41d7d0 87364->87363 87390 417f9d 46 API calls 2 library calls 87364->87390 87365->87368 87366->87356 87368->87356 87368->87360 87369->87336 87370->87342 87371->87337 87372->87343 87373->87342 87374->87350 87375->87342 87377 41ae12 87376->87377 87378 41adfa 87376->87378 87381 417f8a __tsopen_nolock 46 API calls 87377->87381 87384 41ae51 87377->87384 87379 417f8a __tsopen_nolock 46 API calls 87378->87379 87380 41adff 87379->87380 87382 417f77 __tsopen_nolock 46 API calls 87380->87382 87383 41ae23 87381->87383 87388 41ae07 87382->87388 87385 417f77 __tsopen_nolock 46 API calls 87383->87385 87384->87358 87386 41ae2b 87385->87386 87387 417f25 __tsopen_nolock 10 API calls 87386->87387 87387->87388 87388->87358 87389->87364 87390->87363 87392 414c82 __tsopen_nolock 87391->87392 87393 414cc3 87392->87393 87394 414c96 __localtime64_s 87392->87394 87395 414cbb __tsopen_nolock 87392->87395 87396 415471 __lock_file 47 API calls 87393->87396 87418 417f77 46 API calls __getptd_noexit 87394->87418 87395->87062 87397 414ccb 87396->87397 87404 414aba 87397->87404 87399 414cb0 87419 417f25 10 API calls __tsopen_nolock 87399->87419 87405 414af2 87404->87405 87408 414ad8 __localtime64_s 87404->87408 87420 414cfa LeaveCriticalSection LeaveCriticalSection _fseek 87405->87420 87406 414ae2 87471 417f77 46 API calls __getptd_noexit 87406->87471 87408->87405 87408->87406 87410 414b2d 87408->87410 87410->87405 87412 414c38 __localtime64_s 87410->87412 87413 414139 __flswbuf 46 API calls 87410->87413 87421 41dfcc 87410->87421 87451 41d8f3 87410->87451 87473 41e0c2 46 API calls 3 library calls 87410->87473 87474 417f77 46 API calls __getptd_noexit 87412->87474 87413->87410 87417 414ae7 87472 417f25 10 API calls __tsopen_nolock 87417->87472 87418->87399 87419->87395 87420->87395 87422 41dfd8 __tsopen_nolock 87421->87422 87423 41dfe0 87422->87423 87424 41dffb 87422->87424 87544 417f8a 46 API calls __getptd_noexit 87423->87544 87425 41e007 87424->87425 87431 41e041 87424->87431 87546 417f8a 46 API calls __getptd_noexit 87425->87546 87427 41dfe5 87545 417f77 46 API calls __getptd_noexit 87427->87545 87430 41e00c 87547 417f77 46 API calls __getptd_noexit 87430->87547 87432 41e063 87431->87432 87433 41e04e 87431->87433 87436 41ae56 ___lock_fhandle 48 API calls 87432->87436 87549 417f8a 46 API calls __getptd_noexit 87433->87549 87438 41e069 87436->87438 87437 41e053 87550 417f77 46 API calls __getptd_noexit 87437->87550 87440 41e077 87438->87440 87441 41e08b 87438->87441 87475 41da15 87440->87475 87551 417f77 46 API calls __getptd_noexit 87441->87551 87443 41e014 87548 417f25 10 API calls __tsopen_nolock 87443->87548 87446 41dfed __tsopen_nolock 87446->87410 87447 41e083 87553 41e0ba LeaveCriticalSection __unlock_fhandle 87447->87553 87448 41e090 87552 417f8a 46 API calls __getptd_noexit 87448->87552 87452 41d900 87451->87452 87455 41d915 87451->87455 87557 417f77 46 API calls __getptd_noexit 87452->87557 87454 41d905 87558 417f25 10 API calls __tsopen_nolock 87454->87558 87457 41d94a 87455->87457 87463 41d910 87455->87463 87554 420603 87455->87554 87459 414139 __flswbuf 46 API calls 87457->87459 87460 41d95e 87459->87460 87461 41dfcc __read 59 API calls 87460->87461 87462 41d965 87461->87462 87462->87463 87464 414139 __flswbuf 46 API calls 87462->87464 87463->87410 87465 41d988 87464->87465 87465->87463 87466 414139 __flswbuf 46 API calls 87465->87466 87467 41d994 87466->87467 87467->87463 87468 414139 __flswbuf 46 API calls 87467->87468 87469 41d9a1 87468->87469 87470 414139 __flswbuf 46 API calls 87469->87470 87470->87463 87471->87417 87472->87405 87473->87410 87474->87417 87476 41da31 87475->87476 87477 41da4c 87475->87477 87479 417f8a __tsopen_nolock 46 API calls 87476->87479 87478 41da5b 87477->87478 87480 41da7a 87477->87480 87481 417f8a __tsopen_nolock 46 API calls 87478->87481 87482 41da36 87479->87482 87485 41da98 87480->87485 87496 41daac 87480->87496 87484 41da60 87481->87484 87483 417f77 __tsopen_nolock 46 API calls 87482->87483 87497 41da3e 87483->87497 87487 417f77 __tsopen_nolock 46 API calls 87484->87487 87488 417f8a __tsopen_nolock 46 API calls 87485->87488 87486 41db02 87490 417f8a __tsopen_nolock 46 API calls 87486->87490 87489 41da67 87487->87489 87491 41da9d 87488->87491 87492 417f25 __tsopen_nolock 10 API calls 87489->87492 87493 41db07 87490->87493 87494 417f77 __tsopen_nolock 46 API calls 87491->87494 87492->87497 87498 417f77 __tsopen_nolock 46 API calls 87493->87498 87495 41daa4 87494->87495 87500 417f25 __tsopen_nolock 10 API calls 87495->87500 87496->87486 87496->87497 87499 41dae1 87496->87499 87501 41db1b 87496->87501 87497->87447 87498->87495 87499->87486 87504 41daec ReadFile 87499->87504 87500->87497 87503 416b04 __malloc_crt 46 API calls 87501->87503 87505 41db31 87503->87505 87506 41dc17 87504->87506 87507 41df8f GetLastError 87504->87507 87510 41db59 87505->87510 87511 41db3b 87505->87511 87506->87507 87514 41dc2b 87506->87514 87508 41de16 87507->87508 87509 41df9c 87507->87509 87519 417f9d __dosmaperr 46 API calls 87508->87519 87523 41dd9b 87508->87523 87512 417f77 __tsopen_nolock 46 API calls 87509->87512 87515 420494 __lseeki64_nolock 48 API calls 87510->87515 87513 417f77 __tsopen_nolock 46 API calls 87511->87513 87517 41dfa1 87512->87517 87518 41db40 87513->87518 87514->87523 87524 41dc47 87514->87524 87527 41de5b 87514->87527 87516 41db67 87515->87516 87516->87504 87520 417f8a __tsopen_nolock 46 API calls 87517->87520 87521 417f8a __tsopen_nolock 46 API calls 87518->87521 87519->87523 87520->87523 87521->87497 87522 413748 _free 46 API calls 87522->87497 87523->87497 87523->87522 87525 41dcab ReadFile 87524->87525 87532 41dd28 87524->87532 87530 41dcc9 GetLastError 87525->87530 87535 41dcd3 87525->87535 87526 41ded0 ReadFile 87528 41deef GetLastError 87526->87528 87536 41def9 87526->87536 87527->87523 87527->87526 87528->87527 87528->87536 87529 41ddec MultiByteToWideChar 87529->87523 87531 41de10 GetLastError 87529->87531 87530->87524 87530->87535 87531->87508 87532->87523 87533 41dda3 87532->87533 87534 41dd96 87532->87534 87540 41dd60 87532->87540 87533->87540 87541 41ddda 87533->87541 87537 417f77 __tsopen_nolock 46 API calls 87534->87537 87535->87524 87538 420494 __lseeki64_nolock 48 API calls 87535->87538 87536->87527 87539 420494 __lseeki64_nolock 48 API calls 87536->87539 87537->87523 87538->87535 87539->87536 87540->87529 87542 420494 __lseeki64_nolock 48 API calls 87541->87542 87543 41dde9 87542->87543 87543->87529 87544->87427 87545->87446 87546->87430 87547->87443 87548->87446 87549->87437 87550->87443 87551->87448 87552->87447 87553->87446 87555 416b04 __malloc_crt 46 API calls 87554->87555 87556 420618 87555->87556 87556->87457 87557->87454 87558->87463 87562 4148b3 GetSystemTimeAsFileTime __aulldiv 87559->87562 87561 442c6b 87561->87065 87562->87561 87563->87072 87564->87078 87565->87078 87567 45272f __tzset_nolock _wcscpy 87566->87567 87568 414d04 61 API calls __fread_nolock 87567->87568 87569 44afef GetSystemTimeAsFileTime 87567->87569 87570 4528a4 87567->87570 87571 4150d1 81 API calls _fseek 87567->87571 87568->87567 87569->87567 87570->86987 87570->86988 87571->87567 87573 44b1bc 87572->87573 87574 44b1ca 87572->87574 87575 4149c2 116 API calls 87573->87575 87576 44b1e1 87574->87576 87577 4149c2 116 API calls 87574->87577 87578 44b1d8 87574->87578 87575->87574 87607 4321a4 87576->87607 87579 44b2db 87577->87579 87578->87014 87579->87576 87581 44b2e9 87579->87581 87583 44b2f6 87581->87583 87586 414a46 __fcloseall 82 API calls 87581->87586 87582 44b224 87584 44b253 87582->87584 87585 44b228 87582->87585 87583->87014 87611 43213d 87584->87611 87588 44b235 87585->87588 87591 414a46 __fcloseall 82 API calls 87585->87591 87586->87583 87589 44b245 87588->87589 87592 414a46 __fcloseall 82 API calls 87588->87592 87589->87014 87590 44b25a 87593 44b260 87590->87593 87594 44b289 87590->87594 87591->87588 87592->87589 87596 44b26d 87593->87596 87598 414a46 __fcloseall 82 API calls 87593->87598 87621 44b0bf 87594->87621 87599 44b27d 87596->87599 87601 414a46 __fcloseall 82 API calls 87596->87601 87597 44b28f 87630 4320f8 87597->87630 87598->87596 87599->87014 87601->87599 87603 44b2a2 87605 44b2b2 87603->87605 87606 414a46 __fcloseall 82 API calls 87603->87606 87604 414a46 __fcloseall 82 API calls 87604->87603 87605->87014 87606->87605 87608 4321cb 87607->87608 87610 4321b4 __tzset_nolock _memmove 87607->87610 87609 414d04 __fread_nolock 61 API calls 87608->87609 87609->87610 87610->87582 87612 4135bb _malloc 46 API calls 87611->87612 87613 432150 87612->87613 87614 4135bb _malloc 46 API calls 87613->87614 87615 432162 87614->87615 87616 4135bb _malloc 46 API calls 87615->87616 87617 432174 87616->87617 87618 4320f8 46 API calls 87617->87618 87619 432189 87617->87619 87620 432198 87618->87620 87619->87590 87620->87590 87622 44b18e 87621->87622 87626 44b0da 87621->87626 87640 43206e 79 API calls 87622->87640 87624 442caf 61 API calls 87624->87626 87625 44b194 87625->87597 87626->87622 87626->87624 87629 44b19d 87626->87629 87638 44b040 61 API calls 87626->87638 87639 442d48 79 API calls 87626->87639 87629->87597 87631 43210f 87630->87631 87632 432109 87630->87632 87634 413748 _free 46 API calls 87631->87634 87635 432122 87631->87635 87633 413748 _free 46 API calls 87632->87633 87633->87631 87634->87635 87636 413748 _free 46 API calls 87635->87636 87637 432135 87635->87637 87636->87637 87637->87603 87637->87604 87638->87626 87639->87626 87640->87625 87641->86916 87642->86918 87643->86937 87644->86937 87645->86937 87646->86931 87647->86937 87648->86937 87649->86941 87650->86950 87651->86952 87652->86952 87702 410160 87653->87702 87655 41012f GetFullPathNameW 87656 410147 moneypunct 87655->87656 87656->86770 87658 4102cb SHGetDesktopFolder 87657->87658 87661 410333 _wcsncpy 87657->87661 87659 4102e0 _wcsncpy 87658->87659 87658->87661 87660 41031c SHGetPathFromIDListW 87659->87660 87659->87661 87660->87661 87661->86773 87663 4101bb 87662->87663 87669 425f4a 87662->87669 87664 410160 52 API calls 87663->87664 87665 4101c7 87664->87665 87706 410200 52 API calls 2 library calls 87665->87706 87666 4114ab __wcsicoll 58 API calls 87666->87669 87668 4101d6 87707 410200 52 API calls 2 library calls 87668->87707 87669->87666 87671 425f6e 87669->87671 87671->86776 87672 4101e9 87672->86776 87674 40f760 128 API calls 87673->87674 87675 40f584 87674->87675 87676 429335 87675->87676 87677 40f58c 87675->87677 87680 4528bd 118 API calls 87676->87680 87678 40f598 87677->87678 87679 429358 87677->87679 87725 4033c0 113 API calls 7 library calls 87678->87725 87726 434034 86 API calls _wprintf 87679->87726 87682 42934b 87680->87682 87685 429373 87682->87685 87686 42934f 87682->87686 87684 40f5b4 87684->86774 87689 4115d7 52 API calls 87685->87689 87688 431e58 82 API calls 87686->87688 87687 429369 87687->87685 87688->87679 87701 4293c5 moneypunct 87689->87701 87690 42959c 87691 413748 _free 46 API calls 87690->87691 87692 4295a5 87691->87692 87693 431e58 82 API calls 87692->87693 87694 4295b1 87693->87694 87698 401b10 52 API calls 87698->87701 87701->87690 87701->87698 87708 444af8 87701->87708 87711 402780 87701->87711 87719 4022d0 87701->87719 87727 44c7dd 64 API calls 3 library calls 87701->87727 87728 44b41c 52 API calls 87701->87728 87703 410167 _wcslen 87702->87703 87704 4115d7 52 API calls 87703->87704 87705 41017e _wcscpy 87704->87705 87705->87655 87706->87668 87707->87672 87709 4115d7 52 API calls 87708->87709 87710 444b27 _memmove 87709->87710 87710->87701 87712 402790 moneypunct _memmove 87711->87712 87713 402827 87711->87713 87714 4115d7 52 API calls 87712->87714 87715 4115d7 52 API calls 87713->87715 87716 402797 87714->87716 87715->87712 87717 4115d7 52 API calls 87716->87717 87718 4027bd 87716->87718 87717->87718 87718->87701 87720 4022e0 87719->87720 87721 40239d 87719->87721 87720->87721 87722 4115d7 52 API calls 87720->87722 87723 402320 moneypunct 87720->87723 87721->87701 87722->87723 87723->87721 87724 4115d7 52 API calls 87723->87724 87724->87723 87725->87684 87726->87687 87727->87701 87728->87701 87730 402539 moneypunct 87729->87730 87731 402417 87729->87731 87730->86780 87731->87730 87732 4115d7 52 API calls 87731->87732 87733 402443 87732->87733 87734 4115d7 52 API calls 87733->87734 87736 4024b4 87734->87736 87736->87730 87737 4022d0 52 API calls 87736->87737 87758 402880 87736->87758 87737->87736 87742 401566 87738->87742 87739 401794 87810 40e9a0 90 API calls 87739->87810 87742->87739 87743 4010a0 52 API calls 87742->87743 87744 40167a 87742->87744 87743->87742 87745 4017c0 87744->87745 87811 45e737 90 API calls 3 library calls 87744->87811 87745->86782 87747 40bc70 52 API calls 87746->87747 87756 40d451 87747->87756 87748 40d50f 87815 410600 52 API calls 87748->87815 87750 427c01 87816 45e737 90 API calls 3 library calls 87750->87816 87753 401b10 52 API calls 87753->87756 87754 40d519 87754->86785 87756->87748 87756->87750 87756->87753 87756->87754 87812 40e0a0 52 API calls 87756->87812 87813 40f310 53 API calls 87756->87813 87814 40d860 91 API calls 87756->87814 87759 4115d7 52 API calls 87758->87759 87760 4028b3 87759->87760 87761 4115d7 52 API calls 87760->87761 87781 4028c5 moneypunct _memmove 87761->87781 87762 402780 52 API calls 87763 402b1e moneypunct 87762->87763 87763->87736 87764 427d62 87767 403350 52 API calls 87764->87767 87766 402bb6 87801 403060 53 API calls 87766->87801 87777 427d6b 87767->87777 87769 402aeb moneypunct 87769->87762 87771 42802b moneypunct 87769->87771 87770 402bca 87772 427f63 87770->87772 87773 402bd4 87770->87773 87807 460879 92 API calls 3 library calls 87772->87807 87776 402780 52 API calls 87773->87776 87774 403350 52 API calls 87774->87781 87780 402bdf 87776->87780 87799 427f2c 87777->87799 87804 403020 52 API calls _memmove 87777->87804 87778 427f48 87778->87763 87780->87736 87781->87764 87781->87766 87781->87769 87781->87774 87783 427fd5 87781->87783 87784 402780 52 API calls 87781->87784 87787 402f00 52 API calls 87781->87787 87790 427fa5 87781->87790 87791 428000 87781->87791 87792 4026f0 52 API calls 87781->87792 87798 4115d7 52 API calls 87781->87798 87781->87799 87800 4031b0 63 API calls 87781->87800 87802 402f80 92 API calls _memmove 87781->87802 87803 402280 52 API calls 87781->87803 87805 4013a0 52 API calls 87781->87805 87808 460879 92 API calls 3 library calls 87783->87808 87784->87781 87787->87781 87789 427fe4 87795 402780 52 API calls 87789->87795 87796 402780 52 API calls 87790->87796 87809 460879 92 API calls 3 library calls 87791->87809 87794 402a85 CharUpperBuffW 87792->87794 87794->87781 87795->87778 87796->87763 87798->87781 87806 460879 92 API calls 3 library calls 87799->87806 87800->87781 87801->87770 87802->87781 87803->87781 87804->87777 87805->87781 87806->87778 87807->87778 87808->87789 87809->87763 87810->87744 87811->87745 87812->87756 87813->87756 87814->87756 87815->87754 87816->87754 87817->86798 87818->86799 87820 42c5fe 87819->87820 87872 4091c6 87819->87872 87821 40bc70 52 API calls 87820->87821 87820->87872 87822 42c64e InterlockedIncrement 87821->87822 87823 42c665 87822->87823 87827 42c697 87822->87827 87825 42c672 InterlockedDecrement Sleep InterlockedIncrement 87823->87825 87823->87827 87824 42c737 InterlockedDecrement 87826 42c74a 87824->87826 87825->87823 87825->87827 87828 408f40 VariantClear 87826->87828 87827->87824 87848 42c731 87827->87848 88113 408e80 87827->88113 87830 42c752 87828->87830 88130 410c60 VariantClear moneypunct 87830->88130 87834 42c6db 87835 402160 52 API calls 87834->87835 87836 42c6e5 87835->87836 87837 45340c 85 API calls 87836->87837 87838 42c6f1 87837->87838 88123 40d200 52 API calls 2 library calls 87838->88123 87840 42c6fb 88124 465124 53 API calls 87840->88124 87842 42c715 87843 42c76a 87842->87843 87844 42c719 87842->87844 87848->87824 87872->86847 87878 40afc4 87877->87878 87879 40b156 87877->87879 87880 40afd5 87878->87880 87881 42d1e3 87878->87881 88194 45e737 90 API calls 3 library calls 87879->88194 87885 40a780 206 API calls 87880->87885 87902 40b11a moneypunct 87880->87902 88195 45e737 90 API calls 3 library calls 87881->88195 87884 40b143 87884->86847 87888 40b00a 87885->87888 87886 42d1f8 87890 408f40 VariantClear 87886->87890 87888->87886 87891 40b012 87888->87891 87889 42d4db 87889->87889 87890->87884 87892 40b04a 87891->87892 87893 42d231 VariantClear 87891->87893 87899 40b094 moneypunct 87891->87899 87900 40b05c moneypunct 87892->87900 88196 40e270 VariantClear moneypunct 87892->88196 87893->87900 87894 42d45a VariantClear 87894->87902 87896 40b108 87896->87902 88197 40e270 VariantClear moneypunct 87896->88197 87897 4115d7 52 API calls 87897->87899 87899->87896 87901 42d425 moneypunct 87899->87901 87900->87897 87900->87899 87901->87894 87901->87902 87902->87884 88198 45e737 90 API calls 3 library calls 87902->88198 87904 408fff 87903->87904 87909 40900d 87903->87909 88199 403ea0 52 API calls __cinit 87904->88199 87907 42c3f6 88202 45e737 90 API calls 3 library calls 87907->88202 87909->87907 87910 40a780 206 API calls 87909->87910 87911 4090f2 moneypunct 87909->87911 87912 42c44a 87909->87912 87914 42c47b 87909->87914 87916 42c4cb 87909->87916 87917 42c564 87909->87917 87920 42c548 87909->87920 87924 409112 87909->87924 87925 42c528 87909->87925 87927 4090df 87909->87927 87932 4090ea 87909->87932 88201 4534e3 52 API calls 87909->88201 88203 40c4e0 206 API calls 87909->88203 87910->87909 87911->86847 88204 45e737 90 API calls 3 library calls 87912->88204 88205 451b42 61 API calls 87914->88205 88207 47faae 237 API calls 87916->88207 87921 408f40 VariantClear 87917->87921 88210 45e737 90 API calls 3 library calls 87920->88210 87921->87911 87922 42c491 87922->87911 88206 45e737 90 API calls 3 library calls 87922->88206 87923 42c4da 87923->87911 88208 45e737 90 API calls 3 library calls 87923->88208 87924->87920 87930 40912b 87924->87930 88209 45e737 90 API calls 3 library calls 87925->88209 87927->87932 87933 408e80 VariantClear 87927->87933 87930->87911 88200 403e10 53 API calls 87930->88200 87934 408f40 VariantClear 87932->87934 87933->87932 87934->87911 87936 40914b 87937 408f40 VariantClear 87936->87937 87937->87911 88211 408d90 87938->88211 87940 429778 88237 410c60 VariantClear moneypunct 87940->88237 87942 429780 87943 42976c 88236 45e737 90 API calls 3 library calls 87943->88236 87945 408cf9 87945->87940 87945->87943 87946 408d2d 87945->87946 88227 403d10 87946->88227 87949 408d71 moneypunct 87949->86847 87950 408f40 VariantClear 87951 408d45 moneypunct 87950->87951 87951->87949 87951->87950 87953 425c87 87952->87953 87954 40d15f 87952->87954 87955 425cc7 87953->87955 87956 425ca1 TranslateAcceleratorW 87953->87956 87954->86847 87956->87954 87958 42602f 87957->87958 87961 40d17f 87957->87961 87958->86847 87959 40d18c 87959->86847 87960 42608e IsDialogMessageW 87960->87959 87960->87961 87961->87959 87961->87960 88442 430c46 GetClassLongW 87961->88442 87964 4096c6 _wcslen 87963->87964 87965 4115d7 52 API calls 87964->87965 88027 40a70c moneypunct _memmove 87964->88027 87966 4096fa _memmove 87965->87966 87967 4115d7 52 API calls 87966->87967 87969 40971b 87967->87969 87972 409749 CharUpperBuffW 87969->87972 87974 40976a moneypunct 87969->87974 87969->88027 87970 4297aa 87971 4115d7 52 API calls 87970->87971 88014 4297d1 _memmove 87971->88014 87972->87974 88023 4097e5 moneypunct 87974->88023 88445 47dcbb 208 API calls 87974->88445 87976 408f40 VariantClear 87977 42ae92 87976->87977 88472 410c60 VariantClear moneypunct 87977->88472 87979 42aea4 87980 409aa2 87982 4115d7 52 API calls 87980->87982 87987 409afe 87980->87987 87980->88014 87981 40a689 87984 4115d7 52 API calls 87981->87984 87982->87987 87983 4115d7 52 API calls 87983->88023 88001 40a6af moneypunct _memmove 87984->88001 87985 409b2a 87989 429dbe 87985->87989 88055 409b4d moneypunct _memmove 87985->88055 88453 40b400 VariantClear VariantClear moneypunct 87985->88453 87986 40c2c0 52 API calls 87986->88023 87987->87985 87988 4115d7 52 API calls 87987->87988 87990 429d31 87988->87990 87993 429dd3 87989->87993 88454 40b400 VariantClear VariantClear moneypunct 87989->88454 87992 429d42 87990->87992 88449 44a801 52 API calls 87990->88449 88450 40e0a0 52 API calls 87992->88450 87993->88055 88455 40e1c0 VariantClear moneypunct 87993->88455 87994 429a46 VariantClear 87994->88023 87995 409fd2 87998 40a045 87995->87998 88050 42a3f5 87995->88050 88003 4115d7 52 API calls 87998->88003 87999 408f40 VariantClear 87999->88023 88009 4115d7 52 API calls 88001->88009 88010 40a04c 88003->88010 88006 40ba10 52 API calls 88006->88023 88007 42a42f 88459 45e737 90 API calls 3 library calls 88007->88459 88009->88027 88012 40a0a7 88010->88012 88016 4091e0 323 API calls 88010->88016 88011 429d57 88451 453443 52 API calls 88011->88451 88035 40a0af 88012->88035 88460 40c790 VariantClear moneypunct 88012->88460 88013 4299d9 88017 408f40 VariantClear 88013->88017 88471 45e737 90 API calls 3 library calls 88014->88471 88016->88012 88022 4299e2 88017->88022 88018 429abd 88018->86847 88019 429d88 88452 453443 52 API calls 88019->88452 88447 410c60 VariantClear moneypunct 88022->88447 88023->87980 88023->87981 88023->87983 88023->87986 88023->87994 88023->87999 88023->88001 88023->88006 88023->88013 88023->88014 88023->88018 88025 42a452 88023->88025 88029 40a780 206 API calls 88023->88029 88446 40c4e0 206 API calls 88023->88446 88448 40e270 VariantClear moneypunct 88023->88448 88025->87976 88444 4013a0 52 API calls 88027->88444 88029->88023 88032 4115d7 52 API calls 88032->88055 88033 41130a 51 API calls __cinit 88033->88055 88034 402780 52 API calls 88034->88055 88036 40a11b 88035->88036 88038 42a4b4 VariantClear 88035->88038 88063 40a162 moneypunct _memmove 88035->88063 88037 40a780 206 API calls 88037->88055 88040 401980 53 API calls 88040->88055 88041 408e80 VariantClear 88041->88055 88046 44a801 52 API calls 88046->88055 88458 47390f VariantClear 88050->88458 88054 409c95 88054->86847 88055->87995 88055->88007 88055->88027 88055->88032 88055->88033 88055->88034 88055->88037 88055->88040 88055->88041 88055->88046 88055->88050 88055->88054 88456 45f508 52 API calls 88055->88456 88457 403e10 53 API calls 88055->88457 88086 40a650 moneypunct 88086->86847 88090->86847 88091->86809 88092->86814 88093->86847 88094->86847 88095->86847 88096->86847 88097->86847 88098->86849 88099->86849 88100->86849 88101->86849 88102->86849 88103->86849 88104->86849 88106 403cdf 88105->88106 88107 408f40 VariantClear 88106->88107 88108 403ce7 88107->88108 88108->86855 88109->86849 88110->86849 88111->86847 88112->86806 88114 408e88 88113->88114 88116 408e94 88113->88116 88115 408f40 VariantClear 88114->88115 88115->88116 88117 45340c 88116->88117 88118 453439 88117->88118 88119 453419 88117->88119 88118->87834 88120 45342f 88119->88120 88183 4531b1 85 API calls 5 library calls 88119->88183 88120->87834 88122 453425 88122->87834 88123->87840 88124->87842 88130->87872 88183->88122 88194->87881 88195->87886 88196->87900 88197->87902 88198->87889 88199->87909 88200->87936 88201->87909 88202->87911 88203->87909 88204->87911 88205->87922 88206->87911 88207->87923 88208->87911 88209->87911 88210->87917 88212 4289d2 88211->88212 88213 408db3 88211->88213 88239 45e737 90 API calls 3 library calls 88212->88239 88238 40bec0 90 API calls 88213->88238 88216 408dc9 88217 4289e5 88216->88217 88219 40ba10 52 API calls 88216->88219 88220 428a05 88216->88220 88222 40a780 206 API calls 88216->88222 88223 408e64 88216->88223 88225 408f40 VariantClear 88216->88225 88226 408e5a 88216->88226 88240 45e737 90 API calls 3 library calls 88217->88240 88219->88216 88221 408f40 VariantClear 88220->88221 88221->88226 88222->88216 88224 408f40 VariantClear 88223->88224 88224->88226 88225->88216 88226->87945 88228 408f40 VariantClear 88227->88228 88229 403d20 88228->88229 88230 403cd0 VariantClear 88229->88230 88231 403d4d 88230->88231 88241 46f8cb 88231->88241 88260 4813fa 88231->88260 88270 4755ad 88231->88270 88232 403d76 88232->87940 88232->87951 88236->87940 88237->87942 88238->88216 88239->88217 88240->88220 88242 46f8e7 88241->88242 88243 46f978 88241->88243 88244 46f900 88242->88244 88245 46f93c 88242->88245 88246 46f91a 88242->88246 88251 46f8ee 88242->88251 88243->88232 88247 45340c 85 API calls 88244->88247 88249 45340c 85 API calls 88245->88249 88248 45340c 85 API calls 88246->88248 88247->88251 88252 46f931 88248->88252 88253 46f958 88249->88253 88250 45340c 85 API calls 88255 46f971 88250->88255 88251->88250 88261 45340c 85 API calls 88260->88261 88262 481438 88261->88262 88263 402880 95 API calls 88262->88263 88264 48143f 88263->88264 88265 481465 88264->88265 88266 40a780 206 API calls 88264->88266 88266->88265 88336 475077 88270->88336 88389 4533eb 88336->88389 88339 4750ee 88341 408f40 VariantClear 88339->88341 88340 475129 88390 453404 88389->88390 88391 4533f8 88389->88391 88390->88339 88390->88340 88391->88390 88436 4531b1 85 API calls 5 library calls 88391->88436 88436->88390 88442->87961 88444->87970 88445->87974 88446->88023 88447->88086 88448->88023 88449->87992 88450->88011 88451->88019 88452->87985 88453->87989 88454->87993 88455->88055 88456->88055 88457->88055 88458->88007 88459->88025 88460->88012 88471->88025 88472->87979 88473 428905 88474 4115d7 52 API calls 88473->88474 88475 42890c 88474->88475 88476 428945 88475->88476 88477 42891f 88475->88477 88479 4115d7 52 API calls 88476->88479 88478 4115d7 52 API calls 88477->88478 88481 428925 _memmove 88478->88481 88480 42894c 88479->88480 88482 42b14b 88489 40bc10 88482->88489 88484 42b159 88485 4096a0 337 API calls 88484->88485 88486 42b177 88485->88486 88500 44b92d VariantClear 88486->88500 88488 42bc5b 88490 40bc24 88489->88490 88491 40bc17 88489->88491 88493 40bc2a 88490->88493 88494 40bc3c 88490->88494 88492 408e80 VariantClear 88491->88492 88495 40bc1f 88492->88495 88496 408e80 VariantClear 88493->88496 88497 4115d7 52 API calls 88494->88497 88495->88484 88498 40bc33 88496->88498 88499 40bc43 88497->88499 88498->88484 88499->88484 88500->88488 88501 40ad09 88502 40bc10 53 API calls 88501->88502 88503 40ad1f 88502->88503 88505 40ad40 88503->88505 88508 40c1f0 88503->88508 88542 44b92d VariantClear 88505->88542 88507 42bc5b 88509 40c2c0 52 API calls 88508->88509 88510 40c21f 88509->88510 88511 42965b 88510->88511 88512 40c22a 88510->88512 88601 45e737 90 API calls 3 library calls 88511->88601 88513 40c232 88512->88513 88600 40c4e0 206 API calls 88512->88600 88515 40c23e 88513->88515 88520 429673 88513->88520 88516 40c256 88515->88516 88518 4296c7 88515->88518 88519 408e80 VariantClear 88516->88519 88603 45e737 90 API calls 3 library calls 88518->88603 88525 40c25f 88519->88525 88543 47e250 88520->88543 88523 42969a 88537 40c27c 88523->88537 88602 45e737 90 API calls 3 library calls 88523->88602 88526 429721 88525->88526 88525->88537 88604 457f66 87 API calls __write_nolock 88525->88604 88528 429753 88526->88528 88605 472f47 127 API calls 88526->88605 88530 408e80 VariantClear 88528->88530 88529 429708 88532 45340c 85 API calls 88529->88532 88533 42975f 88530->88533 88538 42970e _wcslen 88532->88538 88536 408f40 VariantClear 88533->88536 88534 429734 88535 45340c 85 API calls 88534->88535 88539 42973d _wcslen 88535->88539 88536->88537 88537->88505 88538->88526 88540 408e80 VariantClear 88538->88540 88539->88528 88541 408e80 VariantClear 88539->88541 88540->88526 88541->88528 88542->88507 88544 40bc70 52 API calls 88543->88544 88545 47e28d 88544->88545 88546 47e2ed 88545->88546 88548 47e2ae 88545->88548 88547 46fe32 VariantClear 88546->88547 88549 47e2f6 88547->88549 88550 408e80 VariantClear 88548->88550 88551 47e305 88549->88551 88552 47e319 88549->88552 88553 47e2ba 88550->88553 88554 402160 52 API calls 88551->88554 88646 40e0a0 52 API calls 88552->88646 88557 408f40 VariantClear 88553->88557 88556 47e315 88554->88556 88559 47e38e 88556->88559 88606 475a67 88556->88606 88558 47e2ca 88557->88558 88560 408f40 VariantClear 88558->88560 88634 47b291 88559->88634 88562 47e2d2 88560->88562 88645 410c60 VariantClear moneypunct 88562->88645 88563 47e346 88563->88559 88566 47e34a 88563->88566 88647 45e538 90 API calls 3 library calls 88566->88647 88567 47e3b7 88568 47e3bb 88567->88568 88591 47e3ed 88567->88591 88572 40e710 53 API calls 88568->88572 88569 47e2da 88573 408f40 VariantClear 88569->88573 88571 47e358 88577 408f40 VariantClear 88571->88577 88575 47e3c8 88572->88575 88574 47e2e2 88573->88574 88574->88523 88576 40e710 53 API calls 88575->88576 88576->88571 88579 47e368 88577->88579 88578 47e48e 88583 47e250 237 API calls 88578->88583 88581 408f40 VariantClear 88579->88581 88580 408e80 VariantClear 88582 47e481 88580->88582 88584 47e370 88581->88584 88585 40e710 53 API calls 88582->88585 88586 47e4ae 88583->88586 88648 410c60 VariantClear moneypunct 88584->88648 88585->88578 88589 408f40 VariantClear 88586->88589 88588 47e378 88590 408f40 VariantClear 88588->88590 88592 47e4c0 88589->88592 88593 47e380 88590->88593 88591->88578 88591->88580 88591->88591 88594 408f40 VariantClear 88592->88594 88593->88523 88595 47e4c8 88594->88595 88649 410c60 VariantClear moneypunct 88595->88649 88597 47e4d0 88598 408f40 VariantClear 88597->88598 88599 47e4d8 88598->88599 88599->88523 88600->88513 88601->88520 88602->88537 88603->88537 88604->88529 88605->88534 88607 475ae5 88606->88607 88610 475ac5 88606->88610 88650 45e737 90 API calls 3 library calls 88607->88650 88609 475afe 88611 408f40 VariantClear 88609->88611 88610->88607 88612 475b42 88610->88612 88613 402780 52 API calls 88610->88613 88616 475b06 88611->88616 88614 402780 52 API calls 88612->88614 88613->88610 88624 475b60 88614->88624 88615 475c7c 88617 408f40 VariantClear 88615->88617 88616->88563 88620 475c84 88617->88620 88618 40c2c0 52 API calls 88618->88624 88619 40a780 206 API calls 88619->88624 88620->88563 88621 475cc7 88623 408f40 VariantClear 88621->88623 88622 40ba10 52 API calls 88622->88624 88627 475ca8 88623->88627 88624->88615 88624->88618 88624->88619 88624->88621 88624->88622 88625 475cd5 88624->88625 88626 408f40 VariantClear 88624->88626 88631 475ca0 88624->88631 88651 40c4e0 206 API calls 88624->88651 88652 45e737 90 API calls 3 library calls 88625->88652 88626->88624 88627->88563 88630 475ce8 88632 408f40 VariantClear 88630->88632 88633 408f40 VariantClear 88631->88633 88632->88627 88633->88627 88635 47b2e7 88634->88635 88636 47b2a5 88634->88636 88635->88567 88637 40e710 53 API calls 88636->88637 88638 47b2af 88637->88638 88639 47b2b7 88638->88639 88640 47b2cf 88638->88640 88653 47974b 88639->88653 88642 47974b 144 API calls 88640->88642 88643 47b2df 88642->88643 88643->88567 88644 47b2c7 88644->88567 88645->88569 88646->88556 88647->88571 88648->88588 88649->88597 88650->88609 88651->88624 88652->88630 88654 479786 88653->88654 88655 479aed 88653->88655 88654->88655 88657 479798 88654->88657 88722 451b42 61 API calls 88655->88722 88659 4797a2 88657->88659 88660 4797be 88657->88660 88658 479b00 88658->88644 88715 451b42 61 API calls 88659->88715 88662 4797c7 88660->88662 88663 4797e3 88660->88663 88716 451b42 61 API calls 88662->88716 88693 441eba 88663->88693 88665 4797b5 88665->88644 88667 4797f7 88669 479815 88667->88669 88670 4797fe 88667->88670 88668 4797da 88668->88644 88674 47983c 88669->88674 88698 451d2b 88669->88698 88717 451b42 61 API calls 88670->88717 88672 47980c 88672->88644 88678 4798e6 88674->88678 88709 479714 88674->88709 88675 47994b VariantInit 88682 479980 __localtime64_s 88675->88682 88678->88675 88679 479916 VariantClear 88678->88679 88679->88678 88680 479a44 88720 468070 104 API calls moneypunct 88680->88720 88681 479a0b 88683 479a2c 88681->88683 88684 479a12 88681->88684 88682->88680 88682->88681 88682->88683 88719 451b42 61 API calls 88683->88719 88718 451b42 61 API calls 88684->88718 88688 479a24 88689 479aca VariantClear 88688->88689 88690 479adb 88689->88690 88690->88644 88691 479a50 88691->88689 88721 468070 104 API calls moneypunct 88691->88721 88694 441f12 88693->88694 88695 441ecc _wcslen 88693->88695 88694->88667 88695->88694 88696 410160 52 API calls 88695->88696 88697 441ede 88696->88697 88697->88667 88699 451d5e 88698->88699 88700 451e93 SysFreeString 88699->88700 88701 451f21 88699->88701 88702 451ea0 88699->88702 88708 451d68 88699->88708 88700->88702 88701->88702 88703 451f6d lstrcmpiW 88701->88703 88704 451f7f SysFreeString 88701->88704 88705 451fab 88701->88705 88702->88708 88723 44a545 RaiseException 88702->88723 88703->88704 88707 451fc7 SysFreeString 88703->88707 88704->88701 88705->88674 88707->88702 88708->88674 88710 479728 88709->88710 88724 479500 VariantInit 88710->88724 88712 479730 88763 437063 VariantClear VariantCopy 88712->88763 88714 47973a VariantClear 88714->88674 88715->88665 88716->88668 88717->88672 88718->88688 88719->88688 88720->88691 88721->88691 88722->88658 88723->88702 88725 47952a 88724->88725 88741 47955c 88724->88741 88727 479597 88725->88727 88728 4795c6 88725->88728 88729 479602 88725->88729 88730 4795b0 88725->88730 88733 4796b4 88725->88733 88734 4795e3 88725->88734 88737 479531 88725->88737 88738 479571 88725->88738 88739 479669 88725->88739 88725->88741 88742 479698 88725->88742 88752 479628 88725->88752 88726 408f40 VariantClear 88735 4796d9 88726->88735 88777 443006 57 API calls 88727->88777 88732 45340c 85 API calls 88728->88732 88736 47960d VariantCopy 88729->88736 88729->88741 88778 44b3ac 57 API calls 88730->88778 88743 4795d7 SysAllocString 88732->88743 88781 44ce43 VariantClear SafeArrayCreateVector _memmove 88733->88781 88779 479362 109 API calls 88734->88779 88735->88712 88744 408f40 VariantClear 88736->88744 88749 408f40 VariantClear 88737->88749 88750 408f40 VariantClear 88738->88750 88739->88742 88751 479676 88739->88751 88741->88726 88764 473b76 88742->88764 88743->88741 88748 47961d 88744->88748 88748->88712 88753 479551 88749->88753 88754 47958c 88750->88754 88755 408f40 VariantClear 88751->88755 88756 479500 105 API calls 88752->88756 88753->88712 88754->88712 88757 47968d 88755->88757 88758 479644 88756->88758 88757->88712 88780 437063 VariantClear VariantCopy 88758->88780 88760 47964b VariantClear 88761 408f40 VariantClear 88760->88761 88762 47965e 88761->88762 88762->88712 88763->88714 88782 443106 88764->88782 88766 473b88 SafeArrayCreateVector 88767 473be0 88766->88767 88770 473b99 88766->88770 88768 408f40 VariantClear 88767->88768 88769 473be8 88768->88769 88769->88741 88783 4680ed 55 API calls 88770->88783 88772 473bb8 _memmove 88773 408f40 VariantClear 88772->88773 88774 473bcc 88773->88774 88775 408f40 VariantClear 88774->88775 88776 473bd4 88775->88776 88776->88741 88777->88741 88778->88741 88779->88741 88780->88760 88781->88741 88782->88766 88783->88772 88784 425b2b 88789 40f000 88784->88789 88788 425b3a 88790 4115d7 52 API calls 88789->88790 88791 40f007 88790->88791 88792 4276ea 88791->88792 88798 40f030 88791->88798 88797 41130a 51 API calls __cinit 88797->88788 88799 40f039 88798->88799 88800 40f01a 88798->88800 88828 41130a 51 API calls __cinit 88799->88828 88802 40e500 88800->88802 88803 40bc70 52 API calls 88802->88803 88804 40e515 GetVersionExW 88803->88804 88805 402160 52 API calls 88804->88805 88806 40e557 88805->88806 88829 40e660 88806->88829 88812 427674 88815 4276c6 GetSystemInfo 88812->88815 88814 40e5cd GetCurrentProcess 88850 40ef20 LoadLibraryA GetProcAddress 88814->88850 88817 4276d5 GetSystemInfo 88815->88817 88820 40e629 88847 40ef90 88820->88847 88821 40e5e0 88821->88817 88843 40efd0 88821->88843 88824 40e641 FreeLibrary 88825 40e644 88824->88825 88826 40e653 FreeLibrary 88825->88826 88827 40e656 88825->88827 88826->88827 88827->88797 88828->88800 88830 40e667 88829->88830 88831 42761d 88830->88831 88832 40c600 52 API calls 88830->88832 88833 40e55c 88832->88833 88834 40e680 88833->88834 88835 40e687 88834->88835 88836 427616 88835->88836 88837 40c600 52 API calls 88835->88837 88838 40e566 88837->88838 88838->88812 88839 40ef60 88838->88839 88840 40e5c8 88839->88840 88841 40ef66 LoadLibraryA 88839->88841 88840->88814 88840->88821 88841->88840 88842 40ef77 GetProcAddress 88841->88842 88842->88840 88844 40e620 88843->88844 88845 40efd6 LoadLibraryA 88843->88845 88844->88815 88844->88820 88845->88844 88846 40efe7 GetProcAddress 88845->88846 88846->88844 88851 40efb0 LoadLibraryA GetProcAddress 88847->88851 88849 40e632 GetNativeSystemInfo 88849->88824 88849->88825 88850->88821 88851->88849 88852 425b5e 88857 40c7f0 88852->88857 88856 425b6d 88892 40db10 52 API calls 88857->88892 88859 40c82a 88893 410ab0 6 API calls 88859->88893 88861 40c86d 88862 40bc70 52 API calls 88861->88862 88863 40c877 88862->88863 88864 40bc70 52 API calls 88863->88864 88865 40c881 88864->88865 88866 40bc70 52 API calls 88865->88866 88867 40c88b 88866->88867 88868 40bc70 52 API calls 88867->88868 88869 40c8d1 88868->88869 88870 40bc70 52 API calls 88869->88870 88871 40c991 88870->88871 88894 40d2c0 52 API calls 88871->88894 88873 40c99b 88895 40d0d0 53 API calls 88873->88895 88875 40c9c1 88876 40bc70 52 API calls 88875->88876 88877 40c9cb 88876->88877 88896 40e310 53 API calls 88877->88896 88879 40ca28 88880 408f40 VariantClear 88879->88880 88881 40ca30 88880->88881 88882 408f40 VariantClear 88881->88882 88883 40ca38 GetStdHandle 88882->88883 88884 429630 88883->88884 88885 40ca87 88883->88885 88884->88885 88886 429639 88884->88886 88891 41130a 51 API calls __cinit 88885->88891 88897 4432c0 57 API calls 88886->88897 88888 429641 88898 44b6ab CreateThread 88888->88898 88890 42964f CloseHandle 88890->88885 88891->88856 88892->88859 88893->88861 88894->88873 88895->88875 88896->88879 88897->88888 88898->88890 88899 44b5cb 58 API calls 88898->88899 88900 425b6f 88905 40dc90 88900->88905 88904 425b7e 88906 40bc70 52 API calls 88905->88906 88907 40dd03 88906->88907 88913 40f210 88907->88913 88909 40dd96 88911 40ddb7 88909->88911 88916 40dc00 52 API calls 2 library calls 88909->88916 88912 41130a 51 API calls __cinit 88911->88912 88912->88904 88917 40f250 RegOpenKeyExW 88913->88917 88915 40f230 88915->88909 88916->88909 88918 425e17 88917->88918 88919 40f275 RegQueryValueExW 88917->88919 88918->88915 88920 40f2c3 RegCloseKey 88919->88920 88921 40f298 88919->88921 88920->88915 88922 40f2a9 RegCloseKey 88921->88922 88923 425e1d 88921->88923 88922->88915 88924 3fc7a73 88925 3fc7a7a 88924->88925 88926 3fc7b18 88925->88926 88927 3fc7a82 88925->88927 88944 3fc83c8 9 API calls 88926->88944 88931 3fc7728 88927->88931 88930 3fc7aff 88932 3fc5118 GetPEB 88931->88932 88933 3fc77c7 88932->88933 88936 3fc7821 VirtualAlloc 88933->88936 88937 3fc7805 88933->88937 88942 3fc7928 CloseHandle 88933->88942 88943 3fc7938 VirtualFree 88933->88943 88945 3fc8638 GetPEB 88933->88945 88935 3fc77f8 CreateFileW 88935->88933 88935->88937 88936->88937 88938 3fc7842 ReadFile 88936->88938 88939 3fc7a14 VirtualFree 88937->88939 88940 3fc7a22 88937->88940 88938->88937 88941 3fc7860 VirtualAlloc 88938->88941 88939->88940 88940->88930 88941->88933 88941->88937 88942->88933 88943->88933 88944->88930 88946 3fc8662 88945->88946 88946->88935
                                                    APIs
                                                    • _wcslen.LIBCMT ref: 004096C1
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • _memmove.LIBCMT ref: 0040970C
                                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                    • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
                                                    • _memmove.LIBCMT ref: 00409D96
                                                    • _memmove.LIBCMT ref: 0040A6C4
                                                    • _memmove.LIBCMT ref: 004297E5
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
                                                    • String ID:
                                                    • API String ID: 2383988440-0
                                                    • Opcode ID: bff07251c1bb516278e71f3264a6d42dad8909b988b054a0f27da0d00a56500c
                                                    • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
                                                    • Opcode Fuzzy Hash: bff07251c1bb516278e71f3264a6d42dad8909b988b054a0f27da0d00a56500c
                                                    • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B

                                                    Control-flow Graph

                                                    APIs
                                                    • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
                                                      • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe,00000104,?), ref: 00401F4C
                                                      • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
                                                      • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
                                                      • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
                                                      • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
                                                      • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
                                                    • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
                                                    • GetFullPathNameW.KERNEL32(C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe,00000104,?,004A7F50,004A7F54), ref: 0040D625
                                                      • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
                                                    • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
                                                    • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
                                                    • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
                                                    • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
                                                      • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                                      • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                                      • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
                                                      • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
                                                      • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
                                                      • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                                      • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
                                                      • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                                      • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                                      • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
                                                      • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
                                                      • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
                                                    • String ID: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe$This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                                                    • API String ID: 2495805114-554927120
                                                    • Opcode ID: 41e582475c413773e3743a4b8e51b79ae17ec4e07ea1e63541618b073f9d51de
                                                    • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
                                                    • Opcode Fuzzy Hash: 41e582475c413773e3743a4b8e51b79ae17ec4e07ea1e63541618b073f9d51de
                                                    • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1515 46cb5f-46cbc3 call 40bc70 * 3 call 408f40 1524 46cbd4-46cbe7 CLSIDFromProgID 1515->1524 1525 46cbc5-46cbcd OleInitialize 1515->1525 1526 46cc33-46cc47 1524->1526 1527 46cbe9-46cbf9 CLSIDFromString 1524->1527 1525->1524 1528 46cca6-46ccba call 458651 1526->1528 1529 46cc49-46cc60 CoCreateInstance 1526->1529 1527->1526 1530 46cbfb-46cc05 1527->1530 1532 46cc96-46cca1 1528->1532 1539 46ccbc-46ccf7 CoInitializeSecurity call 412f40 call 4311fc 1528->1539 1529->1532 1533 46cc62-46cc8b call 43119b 1529->1533 1534 46cc06-46cc30 call 451b42 call 402250 * 3 1530->1534 1532->1534 1550 46cc8e-46cc90 1533->1550 1553 46cdf4 1539->1553 1554 46ccfd-46cd1f call 402160 call 431a2b 1539->1554 1550->1532 1551 46ceb7-46cef0 call 468070 call 402250 * 3 1550->1551 1555 46cdfa-46ce4a call 412f40 CoCreateInstanceEx CoTaskMemFree 1553->1555 1569 46cd35-46cd47 call 465177 1554->1569 1570 46cd21-46cd33 1554->1570 1555->1532 1564 46ce50-46ce55 1555->1564 1564->1532 1568 46ce5b-46ce62 1564->1568 1573 46ce64-46ce8b CoSetProxyBlanket 1568->1573 1574 46ce8d-46ce9e 1568->1574 1582 46cd4a-46cda3 call 40e0a0 call 402250 call 46150f call 40e0a0 call 402250 1569->1582 1575 46cda5-46cdaa 1570->1575 1573->1574 1574->1550 1578 46cea4-46ceb2 1574->1578 1579 46cdac-46cdbb call 4111c1 1575->1579 1580 46cdbd-46cdc0 1575->1580 1578->1534 1581 46cdc3-46cdf2 1579->1581 1580->1581 1581->1555 1582->1575
                                                    APIs
                                                    • OleInitialize.OLE32(00000000), ref: 0046CBC7
                                                    • CLSIDFromProgID.COMBASE(?,?), ref: 0046CBDF
                                                    • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
                                                    • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
                                                    • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
                                                    • _wcslen.LIBCMT ref: 0046CDB0
                                                    • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
                                                    • CoTaskMemFree.OLE32(?), ref: 0046CE42
                                                    • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
                                                      • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
                                                      • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
                                                      • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
                                                    Strings
                                                    • NULL Pointer assignment, xrefs: 0046CEA6
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
                                                    • String ID: NULL Pointer assignment
                                                    • API String ID: 440038798-2785691316
                                                    • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                                    • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
                                                    • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                                    • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1986 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 1995 40e582-40e583 1986->1995 1996 427674-427679 1986->1996 1999 40e585-40e596 1995->1999 2000 40e5ba-40e5cb call 40ef60 1995->2000 1997 427683-427686 1996->1997 1998 42767b-427681 1996->1998 2002 427693-427696 1997->2002 2003 427688-427691 1997->2003 2001 4276b4-4276be 1998->2001 2004 427625-427629 1999->2004 2005 40e59c-40e59f 1999->2005 2013 40e5ec-40e60c 2000->2013 2014 40e5cd-40e5e6 GetCurrentProcess call 40ef20 2000->2014 2015 4276c6-4276ca GetSystemInfo 2001->2015 2002->2001 2011 427698-4276a8 2002->2011 2003->2001 2007 427636-427640 2004->2007 2008 42762b-427631 2004->2008 2009 40e5a5-40e5ae 2005->2009 2010 427654-427657 2005->2010 2007->2000 2008->2000 2017 40e5b4 2009->2017 2018 427645-42764f 2009->2018 2010->2000 2016 42765d-42766f 2010->2016 2019 4276b0 2011->2019 2020 4276aa-4276ae 2011->2020 2022 40e612-40e623 call 40efd0 2013->2022 2023 4276d5-4276df GetSystemInfo 2013->2023 2014->2013 2029 40e5e8 2014->2029 2015->2023 2016->2000 2017->2000 2018->2000 2019->2001 2020->2001 2022->2015 2028 40e629-40e63f call 40ef90 GetNativeSystemInfo 2022->2028 2032 40e641-40e642 FreeLibrary 2028->2032 2033 40e644-40e651 2028->2033 2029->2013 2032->2033 2034 40e653-40e654 FreeLibrary 2033->2034 2035 40e656-40e65d 2033->2035 2034->2035
                                                    APIs
                                                    • GetVersionExW.KERNEL32(?), ref: 0040E52A
                                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                    • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
                                                    • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
                                                    • FreeLibrary.KERNEL32(?), ref: 0040E642
                                                    • FreeLibrary.KERNEL32(?), ref: 0040E654
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
                                                    • String ID: 0SH
                                                    • API String ID: 3363477735-851180471
                                                    • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                                    • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
                                                    • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                                    • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A
                                                    APIs
                                                    • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
                                                    • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID: IsThemeActive$uxtheme.dll
                                                    • API String ID: 2574300362-3542929980
                                                    • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                                    • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
                                                    • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                                    • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768
                                                    APIs
                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
                                                    • Sleep.KERNEL32(0000000A,?), ref: 004094D1
                                                    • TranslateMessage.USER32(?), ref: 00409556
                                                    • DispatchMessageW.USER32(?), ref: 00409561
                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Message$Peek$DispatchSleepTranslate
                                                    • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
                                                    • API String ID: 1762048999-758534266
                                                    • Opcode ID: f501adada9997479f36eff97a8dbeac7b9e74cdaa6692d9ba2f3cae751283df7
                                                    • Instruction ID: 6221a9036d09df45d33125ba93b856da71e554157a22c4cdc10a0b2ba1356448
                                                    • Opcode Fuzzy Hash: f501adada9997479f36eff97a8dbeac7b9e74cdaa6692d9ba2f3cae751283df7
                                                    • Instruction Fuzzy Hash: EF62E370608341AFD724DF25C884BABF7A4BF85304F14492FF94597292D778AC89CB9A

                                                    Control-flow Graph

                                                    APIs
                                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe,00000104,?), ref: 00401F4C
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • __wcsicoll.LIBCMT ref: 00402007
                                                    • __wcsicoll.LIBCMT ref: 0040201D
                                                    • __wcsicoll.LIBCMT ref: 00402033
                                                      • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
                                                    • __wcsicoll.LIBCMT ref: 00402049
                                                    • _wcscpy.LIBCMT ref: 0040207C
                                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe,00000104), ref: 00428B5B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
                                                    • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe$CMDLINE$CMDLINERAW
                                                    • API String ID: 3948761352-3277844779
                                                    • Opcode ID: 27c0ee8d5e07ffa73b3ecf85f0a0f7e742300051f6853106ad547b3ced8c3f3f
                                                    • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
                                                    • Opcode Fuzzy Hash: 27c0ee8d5e07ffa73b3ecf85f0a0f7e742300051f6853106ad547b3ced8c3f3f
                                                    • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

                                                    Control-flow Graph

                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: __fread_nolock$_fseek_wcscpy
                                                    • String ID: D)E$D)E$FILE
                                                    • API String ID: 3888824918-361185794
                                                    • Opcode ID: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                                                    • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
                                                    • Opcode Fuzzy Hash: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                                                    • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

                                                    Control-flow Graph

                                                    APIs
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
                                                    • __wsplitpath.LIBCMT ref: 0040E41C
                                                      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                    • _wcsncat.LIBCMT ref: 0040E433
                                                    • __wmakepath.LIBCMT ref: 0040E44F
                                                      • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
                                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                    • _wcscpy.LIBCMT ref: 0040E487
                                                      • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                                    • _wcscat.LIBCMT ref: 00427541
                                                    • _wcslen.LIBCMT ref: 00427551
                                                    • _wcslen.LIBCMT ref: 00427562
                                                    • _wcscat.LIBCMT ref: 0042757C
                                                    • _wcsncpy.LIBCMT ref: 004275BC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
                                                    • String ID: Include$\
                                                    • API String ID: 3173733714-3429789819
                                                    • Opcode ID: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
                                                    • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
                                                    • Opcode Fuzzy Hash: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
                                                    • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

                                                    Control-flow Graph

                                                    APIs
                                                    • _fseek.LIBCMT ref: 0045292B
                                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                                      • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                                      • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                                                    • __fread_nolock.LIBCMT ref: 00452961
                                                    • __fread_nolock.LIBCMT ref: 00452971
                                                    • __fread_nolock.LIBCMT ref: 0045298A
                                                    • __fread_nolock.LIBCMT ref: 004529A5
                                                    • _fseek.LIBCMT ref: 004529BF
                                                    • _malloc.LIBCMT ref: 004529CA
                                                    • _malloc.LIBCMT ref: 004529D6
                                                    • __fread_nolock.LIBCMT ref: 004529E7
                                                    • _free.LIBCMT ref: 00452A17
                                                    • _free.LIBCMT ref: 00452A20
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
                                                    • String ID:
                                                    • API String ID: 1255752989-0
                                                    • Opcode ID: 3f43f4209565cf9930803292f55859f81113a3883ec0e7be7bac3bff720706a2
                                                    • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
                                                    • Opcode Fuzzy Hash: 3f43f4209565cf9930803292f55859f81113a3883ec0e7be7bac3bff720706a2
                                                    • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

                                                    Control-flow Graph

                                                    APIs
                                                    • GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                                    • RegisterClassExW.USER32(00000030), ref: 004104ED
                                                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                                    • InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                                    • LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                                    • ImageList_ReplaceIcon.COMCTL32(00960690,000000FF,00000000), ref: 00410552
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                    • API String ID: 2914291525-1005189915
                                                    • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                                    • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
                                                    • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                                    • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99

                                                    Control-flow Graph

                                                    APIs
                                                    • GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                                    • LoadIconW.USER32(?,00000063), ref: 004103C0
                                                    • LoadIconW.USER32(?,000000A4), ref: 004103D3
                                                    • LoadIconW.USER32(?,000000A2), ref: 004103E6
                                                    • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                                    • RegisterClassExW.USER32(?), ref: 0041045D
                                                      • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                                      • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
                                                      • Part of subcall function 00410490: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                                      • Part of subcall function 00410490: InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                                      • Part of subcall function 00410490: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                                      • Part of subcall function 00410490: LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                                      • Part of subcall function 00410490: ImageList_ReplaceIcon.COMCTL32(00960690,000000FF,00000000), ref: 00410552
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                    • String ID: #$0$AutoIt v3
                                                    • API String ID: 423443420-4155596026
                                                    • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                                    • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
                                                    • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                                    • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _malloc
                                                    • String ID: Default
                                                    • API String ID: 1579825452-753088835
                                                    • Opcode ID: 4baf5ca2405be5455ac24bb95f1fa40f153dd1d14dcfbbf3cadbb4c6cd5c85f8
                                                    • Instruction ID: a673259d86369fb9501a746496732cc59a2062e12c9a0651055f0cdb6904a52b
                                                    • Opcode Fuzzy Hash: 4baf5ca2405be5455ac24bb95f1fa40f153dd1d14dcfbbf3cadbb4c6cd5c85f8
                                                    • Instruction Fuzzy Hash: 13729DB06043019FD714DF25D481A2BB7E5EF85314F14882EE986AB391D738EC56CB9B

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2036 40f5c0-40f5cf call 422240 2039 40f5d0-40f5e8 2036->2039 2039->2039 2040 40f5ea-40f613 call 413650 call 410e60 2039->2040 2045 40f614-40f633 call 414d04 2040->2045 2048 40f691 2045->2048 2049 40f635-40f63c 2045->2049 2050 40f696-40f69c 2048->2050 2051 40f660-40f674 call 4150d1 2049->2051 2052 40f63e 2049->2052 2056 40f679-40f67c 2051->2056 2053 40f640 2052->2053 2055 40f642-40f650 2053->2055 2057 40f652-40f655 2055->2057 2058 40f67e-40f68c 2055->2058 2056->2045 2059 40f65b-40f65e 2057->2059 2060 425d1e-425d3e call 4150d1 call 414d04 2057->2060 2061 40f68e-40f68f 2058->2061 2062 40f69f-40f6ad 2058->2062 2059->2051 2059->2053 2073 425d43-425d5f call 414d30 2060->2073 2061->2057 2064 40f6b4-40f6c2 2062->2064 2065 40f6af-40f6b2 2062->2065 2067 425d16 2064->2067 2068 40f6c8-40f6d6 2064->2068 2065->2057 2067->2060 2070 425d05-425d0b 2068->2070 2071 40f6dc-40f6df 2068->2071 2070->2055 2072 425d11 2070->2072 2071->2057 2072->2067 2073->2050
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: __fread_nolock_fseek_memmove_strcat
                                                    • String ID: AU3!$EA06
                                                    • API String ID: 1268643489-2658333250
                                                    • Opcode ID: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                                                    • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
                                                    • Opcode Fuzzy Hash: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                                                    • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2076 401100-401111 2077 401113-401119 2076->2077 2078 401179-401180 2076->2078 2079 401144-40114a 2077->2079 2080 40111b-40111e 2077->2080 2078->2077 2081 401182 2078->2081 2083 401184-40118e call 401250 2079->2083 2084 40114c-40114f 2079->2084 2080->2079 2082 401120-401126 2080->2082 2085 40112c-401141 DefWindowProcW 2081->2085 2082->2085 2086 42b038-42b03f 2082->2086 2095 401193-40119a 2083->2095 2087 401151-401157 2084->2087 2088 40119d 2084->2088 2086->2085 2094 42b045-42b059 call 401000 call 40e0c0 2086->2094 2092 401219-40121f 2087->2092 2093 40115d 2087->2093 2090 4011a3-4011a9 2088->2090 2091 42afb4-42afc5 call 40f190 2088->2091 2090->2082 2096 4011af 2090->2096 2091->2095 2092->2082 2099 401225-42b06d call 468b0e 2092->2099 2097 401163-401166 2093->2097 2098 42b01d-42b024 2093->2098 2094->2085 2096->2082 2102 4011b6-4011d8 KillTimer call 401000 PostQuitMessage 2096->2102 2103 4011db-401202 SetTimer RegisterWindowMessageW 2096->2103 2105 42afe9-42b018 call 40f190 call 401a50 2097->2105 2106 40116c-401172 2097->2106 2098->2085 2104 42b02a-42b033 call 4370f4 2098->2104 2099->2095 2103->2095 2113 401204-401216 CreatePopupMenu 2103->2113 2104->2085 2105->2085 2106->2082 2115 401174-42afde call 45fd57 2106->2115 2115->2085 2127 42afe4 2115->2127 2127->2095
                                                    APIs
                                                    • DefWindowProcW.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
                                                    • KillTimer.USER32(?,00000001,?), ref: 004011B9
                                                    • PostQuitMessage.USER32(00000000), ref: 004011CB
                                                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
                                                    • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,004010F8,?,?,?), ref: 004011F0
                                                    • CreatePopupMenu.USER32 ref: 00401204
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                    • String ID: TaskbarCreated
                                                    • API String ID: 129472671-2362178303
                                                    • Opcode ID: 3a68920b2457bf0ecdafc1b2be4b40edda77bb20db2372f596e363752a538359
                                                    • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
                                                    • Opcode Fuzzy Hash: 3a68920b2457bf0ecdafc1b2be4b40edda77bb20db2372f596e363752a538359
                                                    • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2128 4115d7-4115df 2129 4115ee-4115f9 call 4135bb 2128->2129 2132 4115e1-4115ec call 411988 2129->2132 2133 4115fb-4115fc 2129->2133 2132->2129 2136 4115fd-41160e 2132->2136 2137 411610-41163b call 417fc0 call 41130a 2136->2137 2138 41163c-411656 call 4180af call 418105 2136->2138 2137->2138
                                                    APIs
                                                    • _malloc.LIBCMT ref: 004115F1
                                                      • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                                      • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                                      • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                                    • std::exception::exception.LIBCMT ref: 00411626
                                                    • std::exception::exception.LIBCMT ref: 00411640
                                                    • __CxxThrowException@8.LIBCMT ref: 00411651
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                                                    • String ID: ,*H$4*H$@fI
                                                    • API String ID: 615853336-1459471987
                                                    • Opcode ID: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                                    • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
                                                    • Opcode Fuzzy Hash: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                                    • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2147 3fc7728-3fc77d6 call 3fc5118 2150 3fc77dd-3fc7803 call 3fc8638 CreateFileW 2147->2150 2153 3fc780a-3fc781a 2150->2153 2154 3fc7805 2150->2154 2159 3fc781c 2153->2159 2160 3fc7821-3fc783b VirtualAlloc 2153->2160 2155 3fc7955-3fc7959 2154->2155 2157 3fc799b-3fc799e 2155->2157 2158 3fc795b-3fc795f 2155->2158 2161 3fc79a1-3fc79a8 2157->2161 2162 3fc796b-3fc796f 2158->2162 2163 3fc7961-3fc7964 2158->2163 2159->2155 2166 3fc783d 2160->2166 2167 3fc7842-3fc7859 ReadFile 2160->2167 2168 3fc79fd-3fc7a12 2161->2168 2169 3fc79aa-3fc79b5 2161->2169 2164 3fc797f-3fc7983 2162->2164 2165 3fc7971-3fc797b 2162->2165 2163->2162 2172 3fc7985-3fc798f 2164->2172 2173 3fc7993 2164->2173 2165->2164 2166->2155 2174 3fc785b 2167->2174 2175 3fc7860-3fc78a0 VirtualAlloc 2167->2175 2170 3fc7a14-3fc7a1f VirtualFree 2168->2170 2171 3fc7a22-3fc7a2a 2168->2171 2176 3fc79b9-3fc79c5 2169->2176 2177 3fc79b7 2169->2177 2170->2171 2172->2173 2173->2157 2174->2155 2178 3fc78a7-3fc78c2 call 3fc8888 2175->2178 2179 3fc78a2 2175->2179 2180 3fc79d9-3fc79e5 2176->2180 2181 3fc79c7-3fc79d7 2176->2181 2177->2168 2187 3fc78cd-3fc78d7 2178->2187 2179->2155 2182 3fc79e7-3fc79f0 2180->2182 2183 3fc79f2-3fc79f8 2180->2183 2185 3fc79fb 2181->2185 2182->2185 2183->2185 2185->2161 2188 3fc78d9-3fc7908 call 3fc8888 2187->2188 2189 3fc790a-3fc791e call 3fc8698 2187->2189 2188->2187 2195 3fc7920 2189->2195 2196 3fc7922-3fc7926 2189->2196 2195->2155 2197 3fc7928-3fc792c CloseHandle 2196->2197 2198 3fc7932-3fc7936 2196->2198 2197->2198 2199 3fc7938-3fc7943 VirtualFree 2198->2199 2200 3fc7946-3fc794f 2198->2200 2199->2200 2200->2150 2200->2155
                                                    APIs
                                                    • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 03FC77F9
                                                    • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 03FC7A1F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1406562832.0000000003FC5000.00000040.00000020.00020000.00000000.sdmp, Offset: 03FC5000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3fc5000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: CreateFileFreeVirtual
                                                    • String ID:
                                                    • API String ID: 204039940-0
                                                    • Opcode ID: e3e00bf9dbafeb2e33b0b1731302cb2fbf5584eb46f22b1b855d3d8c7a9348fe
                                                    • Instruction ID: e567e4b10d91f81d62743d9d2ff755463251ff9e4d823789a6cee5a167d49783
                                                    • Opcode Fuzzy Hash: e3e00bf9dbafeb2e33b0b1731302cb2fbf5584eb46f22b1b855d3d8c7a9348fe
                                                    • Instruction Fuzzy Hash: 05A11670E5024AEFDB14DFA4CA94BAEF7B5BF48304F248199E205BB280D7759A84CF50

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2201 4102b0-4102c5 SHGetMalloc 2202 4102cb-4102da SHGetDesktopFolder 2201->2202 2203 425dfd-425e0e call 433244 2201->2203 2204 4102e0-41031a call 412fba 2202->2204 2205 41036b-410379 2202->2205 2213 410360-410368 2204->2213 2214 41031c-410331 SHGetPathFromIDListW 2204->2214 2205->2203 2211 41037f-410384 2205->2211 2213->2205 2215 410351-41035d 2214->2215 2216 410333-41034a call 412fba 2214->2216 2215->2213 2216->2215
                                                    APIs
                                                    • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                                    • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                                    • _wcsncpy.LIBCMT ref: 004102ED
                                                    • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                                    • _wcsncpy.LIBCMT ref: 00410340
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _wcsncpy$DesktopFolderFromListMallocPath
                                                    • String ID: C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe
                                                    • API String ID: 3170942423-2746690534
                                                    • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                                    • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
                                                    • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                                    • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2219 401250-40125c 2220 401262-401293 call 412f40 call 401b80 2219->2220 2221 4012e8-4012ed 2219->2221 2226 4012d1-4012e2 KillTimer SetTimer 2220->2226 2227 401295-4012b5 2220->2227 2226->2221 2228 4012bb-4012bf 2227->2228 2229 4272ec-4272f2 2227->2229 2230 4012c5-4012cb 2228->2230 2231 42733f-427346 2228->2231 2232 4272f4-427315 Shell_NotifyIconW 2229->2232 2233 42731a-42733a Shell_NotifyIconW 2229->2233 2230->2226 2234 427393-4273b4 Shell_NotifyIconW 2230->2234 2235 427348-427369 Shell_NotifyIconW 2231->2235 2236 42736e-42738e Shell_NotifyIconW 2231->2236 2232->2226 2233->2226 2234->2226 2235->2226 2236->2226
                                                    APIs
                                                      • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
                                                      • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
                                                      • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                                    • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
                                                    • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
                                                    • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
                                                    • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
                                                    • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
                                                    • String ID:
                                                    • API String ID: 3300667738-0
                                                    • Opcode ID: 98bdb4639f13a2aff9c284aaa5c14a4e0db979becac89074174bb9299657736d
                                                    • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
                                                    • Opcode Fuzzy Hash: 98bdb4639f13a2aff9c284aaa5c14a4e0db979becac89074174bb9299657736d
                                                    • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A
                                                    APIs
                                                    • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
                                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
                                                    • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: QueryValue$CloseOpen
                                                    • String ID: Include$Software\AutoIt v3\AutoIt
                                                    • API String ID: 1586453840-614718249
                                                    • Opcode ID: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
                                                    • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
                                                    • Opcode Fuzzy Hash: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
                                                    • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768
                                                    APIs
                                                    • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                                    • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                                    • ShowWindow.USER32(?,00000000), ref: 004105E4
                                                    • ShowWindow.USER32(?,00000000), ref: 004105EE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Window$CreateShow
                                                    • String ID: AutoIt v3$edit
                                                    • API String ID: 1584632944-3779509399
                                                    • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                                    • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
                                                    • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                                    • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Variant$Copy$ClearErrorLast
                                                    • String ID: NULL Pointer assignment$Not an Object type
                                                    • API String ID: 2487901850-572801152
                                                    • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                                    • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
                                                    • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                                    • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
                                                    APIs
                                                      • Part of subcall function 03FC73B8: Sleep.KERNELBASE(000001F4), ref: 03FC73C9
                                                    • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 03FC7621
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1406562832.0000000003FC5000.00000040.00000020.00020000.00000000.sdmp, Offset: 03FC5000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3fc5000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: CreateFileSleep
                                                    • String ID: 6E7BSH7LUN8YC0LSW4IJ8
                                                    • API String ID: 2694422964-341141414
                                                    • Opcode ID: 410004f86301a899e336e19cb3c8c6bdacb5d75dd3ceeab03f8b7aaf376a8ac9
                                                    • Instruction ID: 18d937e992bf5e0f3ffb9721567cf1b5aefc0f271f65a5831f9dc20b0fea5d81
                                                    • Opcode Fuzzy Hash: 410004f86301a899e336e19cb3c8c6bdacb5d75dd3ceeab03f8b7aaf376a8ac9
                                                    • Instruction Fuzzy Hash: 47618330D14289DBEF11DBB4C854BEEBB79AF18300F14419DE248BB2C0D6BA1B49CB65
                                                    APIs
                                                    • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
                                                    • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
                                                    • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
                                                    • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Close$OpenQueryValue
                                                    • String ID: Control Panel\Mouse
                                                    • API String ID: 1607946009-824357125
                                                    • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                                    • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
                                                    • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                                    • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4
                                                    APIs
                                                    • CreateProcessW.KERNELBASE(?,00000000), ref: 03FC6BE5
                                                    • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03FC6C09
                                                    • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03FC6C2B
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1406562832.0000000003FC5000.00000040.00000020.00020000.00000000.sdmp, Offset: 03FC5000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3fc5000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                    • String ID:
                                                    • API String ID: 2438371351-0
                                                    • Opcode ID: 9a8a17a12fb03160a4a55839945f9e7e1859a6c72d72ca89e8ed8c326fc6e5c7
                                                    • Instruction ID: 22a46ee5b6e5ff25089e0aa1b5a2f489fb08af70f18f21e5a36a418d3af1699d
                                                    • Opcode Fuzzy Hash: 9a8a17a12fb03160a4a55839945f9e7e1859a6c72d72ca89e8ed8c326fc6e5c7
                                                    • Instruction Fuzzy Hash: 42622D30A642599BEB24CFA4C940BDEB376FF58300F1491A9D10DEB390E7769E81CB59
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
                                                    • Instruction ID: c5df29d3d24fc858ebdc5227190e2e918b6fbc7f8fe9fd347d916346834f6d96
                                                    • Opcode Fuzzy Hash: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
                                                    • Instruction Fuzzy Hash: 66E17F75600209AFCB04DF98C880EAEB7B9FF88714F10859AE909DB351D775EE45CBA0
                                                    APIs
                                                    • VariantInit.OLEAUT32(?), ref: 0047950F
                                                    • SysAllocString.OLEAUT32(00000000), ref: 004795D8
                                                    • VariantCopy.OLEAUT32(?,?), ref: 0047960F
                                                    • VariantClear.OLEAUT32(?), ref: 00479650
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Variant$AllocClearCopyInitString
                                                    • String ID:
                                                    • API String ID: 2808897238-0
                                                    • Opcode ID: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                                    • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
                                                    • Opcode Fuzzy Hash: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                                    • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
                                                    APIs
                                                      • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
                                                    • _free.LIBCMT ref: 004295A0
                                                      • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                                      • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                                      • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
                                                      • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
                                                      • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
                                                      • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
                                                    • String ID: >>>AUTOIT SCRIPT<<<$C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe
                                                    • API String ID: 3938964917-1718363490
                                                    • Opcode ID: 270dd0ea9a5e8039f531707175cdd08c3ef27e69020102fad8003a9fe26c702a
                                                    • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
                                                    • Opcode Fuzzy Hash: 270dd0ea9a5e8039f531707175cdd08c3ef27e69020102fad8003a9fe26c702a
                                                    • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: Error:
                                                    • API String ID: 4104443479-232661952
                                                    • Opcode ID: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
                                                    • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
                                                    • Opcode Fuzzy Hash: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
                                                    • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
                                                    APIs
                                                    • GetOpenFileNameW.COMDLG32(?), ref: 0042961B
                                                      • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe,0040F545,C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe,004A90E8,C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe,?,0040F545), ref: 0041013C
                                                      • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                                      • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                                      • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
                                                      • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                                      • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
                                                      • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: NamePath$Full_wcsncpy$DesktopFileFolderFromListMallocOpen
                                                    • String ID: X$pWH
                                                    • API String ID: 85490731-941433119
                                                    • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                                    • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
                                                    • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                                    • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9
                                                    Strings
                                                    • C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe, xrefs: 00410107
                                                    • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _strcat
                                                    • String ID: >>>AUTOIT NO CMDEXECUTE<<<$C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe
                                                    • API String ID: 1765576173-1081529909
                                                    • Opcode ID: afbcd64a5de9b9cf0401a7756764eed502eca04e8b93ddfb1cf174919bef9872
                                                    • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
                                                    • Opcode Fuzzy Hash: afbcd64a5de9b9cf0401a7756764eed502eca04e8b93ddfb1cf174919bef9872
                                                    • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                                                    • Instruction ID: 8c99b1ef877cebc7a747b8a97cc81d83a07aa3771b44d3adc2ea031a64448d8d
                                                    • Opcode Fuzzy Hash: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                                                    • Instruction Fuzzy Hash: CEF18C716043019FC700DF29C884A5AB7E5FF88318F14C95EF9998B392D7B9E945CB86
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: __filbuf__getptd_noexit__read_memcpy_s
                                                    • String ID:
                                                    • API String ID: 1794320848-0
                                                    • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                                    • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
                                                    • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                                    • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32(00000000,?,00000067,000000FF), ref: 004753C7
                                                    • TerminateProcess.KERNEL32(00000000), ref: 004753CE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Process$CurrentTerminate
                                                    • String ID:
                                                    • API String ID: 2429186680-0
                                                    • Opcode ID: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                                                    • Instruction ID: dddcdfafc98398d1c0f0a19edd80e49036cf45bbfca44c020541658de01b6296
                                                    • Opcode Fuzzy Hash: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                                                    • Instruction Fuzzy Hash: 2C519D71604301AFC710DF65C881BABB7E5EF88308F14891EF9598B382D7B9D945CB96
                                                    APIs
                                                    • _malloc.LIBCMT ref: 0043214B
                                                      • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                                      • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                                      • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                                    • _malloc.LIBCMT ref: 0043215D
                                                    • _malloc.LIBCMT ref: 0043216F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _malloc$AllocateHeap
                                                    • String ID:
                                                    • API String ID: 680241177-0
                                                    • Opcode ID: f71c381a9a4e64bea8472010c286ed0a2169748a03ca4327bb91778eef0474c7
                                                    • Instruction ID: dac51259f70ca5acf95ac1b1a30df86389447b5c3122b5fc7e5239b6c816f1c7
                                                    • Opcode Fuzzy Hash: f71c381a9a4e64bea8472010c286ed0a2169748a03ca4327bb91778eef0474c7
                                                    • Instruction Fuzzy Hash: A0F0E273200B142AD2206A6A6DC1BE7B39ADBD4765F00403FFB058A206DAE9988542EC
                                                    APIs
                                                    • TranslateMessage.USER32(?), ref: 00409556
                                                    • DispatchMessageW.USER32(?), ref: 00409561
                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Message$DispatchPeekTranslate
                                                    • String ID:
                                                    • API String ID: 4217535847-0
                                                    • Opcode ID: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
                                                    • Instruction ID: 9fbe2eaaa5ffb99098057fa667d4f29c0aa55754a5137076743fac66577e99fa
                                                    • Opcode Fuzzy Hash: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
                                                    • Instruction Fuzzy Hash: D8F05431554300AAE624D7A18D41F9B76A89F98784F40482EB641962E1EB78D444CB5A
                                                    APIs
                                                    • _free.LIBCMT ref: 0043210A
                                                      • Part of subcall function 00413748: RtlFreeHeap.NTDLL(00000000,00000000,?,00417A5A,00000000), ref: 0041375E
                                                      • Part of subcall function 00413748: GetLastError.KERNEL32(00000000,?,00417A5A,00000000), ref: 00413770
                                                    • _free.LIBCMT ref: 0043211D
                                                    • _free.LIBCMT ref: 00432130
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _free$ErrorFreeHeapLast
                                                    • String ID:
                                                    • API String ID: 776569668-0
                                                    • Opcode ID: 471d261c1978e8fd492efb66726f25644d258391566ce7e49abf025be84b45d1
                                                    • Instruction ID: d08fe22c6a524c27e4c6c7bcf1019f14b9a5eff3fc739cf1d41fcb720108e0a5
                                                    • Opcode Fuzzy Hash: 471d261c1978e8fd492efb66726f25644d258391566ce7e49abf025be84b45d1
                                                    • Instruction Fuzzy Hash: 29E092F290071433CD1099219941A87F38C4B15B11F08402AFA15A3301E969FA40C1E9
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ClearVariant
                                                    • String ID:
                                                    • API String ID: 1473721057-0
                                                    • Opcode ID: 026107fac7c7bcdbca34bd1b77142632d6848c7cf36883952a1fde06c325d7df
                                                    • Instruction ID: 76271617df0236ab3ccd2777984eb13d60b28668e4953fb9a85eec064aa2abc3
                                                    • Opcode Fuzzy Hash: 026107fac7c7bcdbca34bd1b77142632d6848c7cf36883952a1fde06c325d7df
                                                    • Instruction Fuzzy Hash: F891A370A00204DFDB14DF65D884AAAB3B5EF09304F24C56BE915AB391D739EC41CBAE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6cc5b8d8df15f9e0ef64a75d4efc6b0a4b5787d7574181736057e5700da8ea1b
                                                    • Instruction ID: 87b54257044150471c739d151235b364616bdb39e4aa39848fe8ade81c39f20a
                                                    • Opcode Fuzzy Hash: 6cc5b8d8df15f9e0ef64a75d4efc6b0a4b5787d7574181736057e5700da8ea1b
                                                    • Instruction Fuzzy Hash: 0E519371A00105EBCB14DFA5C8C1EABB7A8AF48344F1481AEF905AB692D77CED45C798
                                                    APIs
                                                      • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
                                                      • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
                                                      • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
                                                    • _strcat.LIBCMT ref: 0040F786
                                                      • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
                                                      • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
                                                    • String ID:
                                                    • API String ID: 3199840319-0
                                                    • Opcode ID: 49a3294527d5b305cfbd6c685c74412098d504eb7a2552fd7b1e5b305baf6987
                                                    • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
                                                    • Opcode Fuzzy Hash: 49a3294527d5b305cfbd6c685c74412098d504eb7a2552fd7b1e5b305baf6987
                                                    • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
                                                    APIs
                                                    • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040D779
                                                    • FreeLibrary.KERNEL32(?), ref: 0040D78E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: FreeInfoLibraryParametersSystem
                                                    • String ID:
                                                    • API String ID: 3403648963-0
                                                    • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                                    • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
                                                    • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                                    • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
                                                    APIs
                                                      • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                    • __lock_file.LIBCMT ref: 00414A8D
                                                      • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
                                                    • __fclose_nolock.LIBCMT ref: 00414A98
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                    • String ID:
                                                    • API String ID: 2800547568-0
                                                    • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                                    • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
                                                    • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                                    • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
                                                    APIs
                                                    • __lock_file.LIBCMT ref: 00415012
                                                    • __ftell_nolock.LIBCMT ref: 0041501F
                                                      • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: __ftell_nolock__getptd_noexit__lock_file
                                                    • String ID:
                                                    • API String ID: 2999321469-0
                                                    • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                                    • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
                                                    • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                                    • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
                                                    APIs
                                                    • CreateProcessW.KERNELBASE(?,00000000), ref: 03FC6BE5
                                                    • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03FC6C09
                                                    • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03FC6C2B
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1406562832.0000000003FC5000.00000040.00000020.00020000.00000000.sdmp, Offset: 03FC5000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3fc5000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                    • String ID:
                                                    • API String ID: 2438371351-0
                                                    • Opcode ID: 935c44ad8318b3af66d252774f477c9026677184fbf87e93bc0843909b837ee7
                                                    • Instruction ID: 6bba7b1a9b9ca3a84b86bb6e46887cb413e5094e51fa0b62ba31cc56e4aa1b78
                                                    • Opcode Fuzzy Hash: 935c44ad8318b3af66d252774f477c9026677184fbf87e93bc0843909b837ee7
                                                    • Instruction Fuzzy Hash: 7912B024E28658C6EB24DF64D8507DEB232EF68300F1050ED910DEB7A5E77A4E85CF5A
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID:
                                                    • API String ID: 4104443479-0
                                                    • Opcode ID: 224a1bccd0668171228bffd00b4e167e84225026459a60d9317a1c29c8a59c26
                                                    • Instruction ID: 6397ebbfaf442e519c955e074037b65107783079284990db5ef0c3dd021860ed
                                                    • Opcode Fuzzy Hash: 224a1bccd0668171228bffd00b4e167e84225026459a60d9317a1c29c8a59c26
                                                    • Instruction Fuzzy Hash: 36317371E00209EBDF009F52E9866AEFBF4FF40740F2189BED855E2650E7389990D759
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ProtectVirtual
                                                    • String ID:
                                                    • API String ID: 544645111-0
                                                    • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                    • Instruction ID: 21b87f0337b3904faf2e49e7d89a80b8c5538d611ad57d97d778efbd48141229
                                                    • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                    • Instruction Fuzzy Hash: 8131F770A00105DBC718DF88E590AAAF7B1FB49310B6486A6E409CF355DB78EDC1CBD9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e5559574dc10eca8e97d8025a500eef8ee7d185e3c773571fee143e03780f234
                                                    • Instruction ID: 427b4a632c312742ac0951887501238d3178a51c37fde1d0fd35c98815df3d2a
                                                    • Opcode Fuzzy Hash: e5559574dc10eca8e97d8025a500eef8ee7d185e3c773571fee143e03780f234
                                                    • Instruction Fuzzy Hash: 21119674200201ABDB249F36D984E26B3A5AF45304B244D2FF9C5D7790DB7CE881DB5E
                                                    APIs
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • _memmove.LIBCMT ref: 00444B34
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _malloc_memmove
                                                    • String ID:
                                                    • API String ID: 1183979061-0
                                                    • Opcode ID: 5456aa698ccb66e472ad2dc6bdf94112e2600af6ff6d776df7a489d92d6f0097
                                                    • Instruction ID: 1ab6fe9f530497837eb86deb75815884a9af672873ccf792f11a5e6f6739e6df
                                                    • Opcode Fuzzy Hash: 5456aa698ccb66e472ad2dc6bdf94112e2600af6ff6d776df7a489d92d6f0097
                                                    • Instruction Fuzzy Hash: E0016D3220410AAFD714DF2CC882DA7B3EDEF88318711492FE996C7251EA74F9508B94
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: __lock_file
                                                    • String ID:
                                                    • API String ID: 3031932315-0
                                                    • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                                    • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
                                                    • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                                    • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
                                                    APIs
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                    • _memmove.LIBCMT ref: 00428939
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: std::exception::exception$Exception@8Throw_malloc_memmove
                                                    • String ID:
                                                    • API String ID: 620504543-0
                                                    • Opcode ID: c9c70bfe2459166c40d63b9fe27fba0aac42174d62b0a7f28c569f684cc4c908
                                                    • Instruction ID: c2064c2796ab03ff69418e3c62d92c7a192424b86f475a5c46dd96dfc8171558
                                                    • Opcode Fuzzy Hash: c9c70bfe2459166c40d63b9fe27fba0aac42174d62b0a7f28c569f684cc4c908
                                                    • Instruction Fuzzy Hash: 27011DB46005509FDB00DF5DD891F5677A1AF8A308F14819DE2098F366DA36E846CB92
                                                    APIs
                                                      • Part of subcall function 00479500: VariantInit.OLEAUT32(?), ref: 0047950F
                                                      • Part of subcall function 00437063: VariantClear.OLEAUT32(00479459), ref: 0043706B
                                                      • Part of subcall function 00437063: VariantCopy.OLEAUT32(00479459,00470E7C), ref: 00437076
                                                    • VariantClear.OLEAUT32(?), ref: 0047973E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Variant$Clear$CopyInit
                                                    • String ID:
                                                    • API String ID: 24293632-0
                                                    • Opcode ID: 5d7337fccf444792d50b64af1a389de1ebb3e8953e67bf22bf250c0f7ac223aa
                                                    • Instruction ID: ce75823fad5ab463881ca656a32c684f825172ff923cb7d6b6c05433a05b9d1b
                                                    • Opcode Fuzzy Hash: 5d7337fccf444792d50b64af1a389de1ebb3e8953e67bf22bf250c0f7ac223aa
                                                    • Instruction Fuzzy Hash: C4E012B251010C6B8704FBFDDDC6CAFB7BCFB18204B80495DB919A3142EA75A914C7E9
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: __wfsopen
                                                    • String ID:
                                                    • API String ID: 197181222-0
                                                    • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                                    • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
                                                    • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                                    • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
                                                    APIs
                                                    • Sleep.KERNELBASE(000001F4), ref: 03FC73C9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1406562832.0000000003FC5000.00000040.00000020.00020000.00000000.sdmp, Offset: 03FC5000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3fc5000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Sleep
                                                    • String ID:
                                                    • API String ID: 3472027048-0
                                                    • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                    • Instruction ID: 9e3696830404e9d08282446a34827be5e4e9ccbb12e92b3cc0bc97b38da64c0c
                                                    • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                    • Instruction Fuzzy Hash: 18E0BF7498010EEFDB00EFA8D6496DD7BB4EF04302F1005A5FD05D7680DB309E54CA62
                                                    APIs
                                                    • Sleep.KERNELBASE(000001F4), ref: 03FC73C9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1406562832.0000000003FC5000.00000040.00000020.00020000.00000000.sdmp, Offset: 03FC5000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3fc5000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Sleep
                                                    • String ID:
                                                    • API String ID: 3472027048-0
                                                    • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                    • Instruction ID: 02341cf1d361fb5b1981d8ffb63ad2ec2d02dc2ebec26c1eabf5f172ec2b57be
                                                    • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                    • Instruction Fuzzy Hash: 90E0E67498010EDFDB00EFB8D64969D7BB4EF04302F1001A5FD01D2280D6309D50CA62
                                                    APIs
                                                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
                                                    • DefDlgProcW.USER32(?,0000004E,?,?), ref: 0047C8FC
                                                    • GetKeyState.USER32(00000011), ref: 0047C92D
                                                    • GetKeyState.USER32(00000009), ref: 0047C936
                                                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
                                                    • GetKeyState.USER32(00000010), ref: 0047C953
                                                    • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C967
                                                    • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
                                                    • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
                                                    • _wcsncpy.LIBCMT ref: 0047CA29
                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
                                                    • SendMessageW.USER32 ref: 0047CA7F
                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
                                                    • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
                                                    • ImageList_SetDragCursorImage.COMCTL32(00960690,00000000,00000000,00000000), ref: 0047CB9B
                                                    • ImageList_BeginDrag.COMCTL32(00960690,00000000,000000F8,000000F0), ref: 0047CBAC
                                                    • SetCapture.USER32(?), ref: 0047CBB6
                                                    • ClientToScreen.USER32(?,?), ref: 0047CC17
                                                    • ImageList_DragEnter.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
                                                    • ReleaseCapture.USER32 ref: 0047CC3A
                                                    • GetCursorPos.USER32(?), ref: 0047CC72
                                                    • ScreenToClient.USER32(?,?), ref: 0047CC80
                                                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
                                                    • SendMessageW.USER32 ref: 0047CD12
                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
                                                    • SendMessageW.USER32 ref: 0047CD80
                                                    • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
                                                    • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
                                                    • GetCursorPos.USER32(?), ref: 0047CDC8
                                                    • ScreenToClient.USER32(?,?), ref: 0047CDD6
                                                    • GetParent.USER32(00000000), ref: 0047CDF7
                                                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
                                                    • SendMessageW.USER32 ref: 0047CE93
                                                    • ClientToScreen.USER32(?,?), ref: 0047CEEE
                                                    • TrackPopupMenuEx.USER32(?,00000000,?,?,02EF1BC0,00000000,?,?,?,?), ref: 0047CF1C
                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
                                                    • SendMessageW.USER32 ref: 0047CF6B
                                                    • ClientToScreen.USER32(?,?), ref: 0047CFB5
                                                    • TrackPopupMenuEx.USER32(?,00000080,?,?,02EF1BC0,00000000,?,?,?,?), ref: 0047CFE6
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 0047D086
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$ClientScreen$Image$CursorDragList_State$CaptureLongMenuPopupTrackWindow$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                    • String ID: @GUI_DRAGID$F
                                                    • API String ID: 3100379633-4164748364
                                                    • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                                    • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
                                                    • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                                    • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
                                                    APIs
                                                    • GetForegroundWindow.USER32 ref: 00434420
                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
                                                    • IsIconic.USER32(?), ref: 0043444F
                                                    • ShowWindow.USER32(?,00000009), ref: 0043445C
                                                    • SetForegroundWindow.USER32(?), ref: 0043446A
                                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
                                                    • GetCurrentThreadId.KERNEL32 ref: 00434485
                                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
                                                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
                                                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
                                                    • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
                                                    • SetForegroundWindow.USER32(00000000), ref: 004344B7
                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
                                                    • keybd_event.USER32(00000012,00000000), ref: 004344CF
                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
                                                    • keybd_event.USER32(00000012,00000000), ref: 004344E6
                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
                                                    • keybd_event.USER32(00000012,00000000), ref: 004344FD
                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
                                                    • keybd_event.USER32(00000012,00000000), ref: 00434514
                                                    • SetForegroundWindow.USER32(00000000), ref: 0043451E
                                                    • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
                                                    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                                                    • String ID: Shell_TrayWnd
                                                    • API String ID: 2889586943-2988720461
                                                    • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                                    • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
                                                    • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                                    • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
                                                    APIs
                                                    • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
                                                    • CloseHandle.KERNEL32(?), ref: 004463A0
                                                    • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
                                                    • GetProcessWindowStation.USER32 ref: 004463D1
                                                    • SetProcessWindowStation.USER32(00000000), ref: 004463DB
                                                    • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
                                                    • _wcslen.LIBCMT ref: 00446498
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • _wcsncpy.LIBCMT ref: 004464C0
                                                    • LoadUserProfileW.USERENV(?,00000020), ref: 004464D9
                                                    • CreateEnvironmentBlock.USERENV(?,?,00000000), ref: 004464F3
                                                    • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,000F01FF,00000400), ref: 00446522
                                                    • UnloadUserProfile.USERENV(?,?), ref: 00446555
                                                    • CloseWindowStation.USER32(00000000), ref: 0044656C
                                                    • CloseDesktop.USER32(?), ref: 0044657A
                                                    • SetProcessWindowStation.USER32(?), ref: 00446588
                                                    • CloseHandle.KERNEL32(?), ref: 00446592
                                                    • DestroyEnvironmentBlock.USERENV(?), ref: 004465A9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_wcslen_wcsncpy
                                                    • String ID: $@OH$default$winsta0
                                                    • API String ID: 3324942560-3791954436
                                                    • Opcode ID: 4d1d68c1aea3dabcf030405aafb24e1344eb51be90ba82aa3e7b9bd6ceeac822
                                                    • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
                                                    • Opcode Fuzzy Hash: 4d1d68c1aea3dabcf030405aafb24e1344eb51be90ba82aa3e7b9bd6ceeac822
                                                    • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
                                                    APIs
                                                    • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
                                                    • FindClose.KERNEL32(00000000), ref: 00478924
                                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
                                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
                                                    • __swprintf.LIBCMT ref: 004789D3
                                                    • __swprintf.LIBCMT ref: 00478A1D
                                                    • __swprintf.LIBCMT ref: 00478A4B
                                                    • __swprintf.LIBCMT ref: 00478A79
                                                      • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
                                                      • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
                                                    • __swprintf.LIBCMT ref: 00478AA7
                                                    • __swprintf.LIBCMT ref: 00478AD5
                                                    • __swprintf.LIBCMT ref: 00478B03
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
                                                    • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                    • API String ID: 999945258-2428617273
                                                    • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                                    • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
                                                    • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                                    • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
                                                    APIs
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                                    • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                                    • __wsplitpath.LIBCMT ref: 00403492
                                                      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                    • _wcscpy.LIBCMT ref: 004034A7
                                                    • _wcscat.LIBCMT ref: 004034BC
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                      • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
                                                      • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
                                                    • _wcscpy.LIBCMT ref: 004035A0
                                                    • _wcslen.LIBCMT ref: 00403623
                                                    • _wcslen.LIBCMT ref: 0040367D
                                                    Strings
                                                    • _, xrefs: 0040371C
                                                    • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
                                                    • Error opening the file, xrefs: 00428231
                                                    • Unterminated string, xrefs: 00428348
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
                                                    • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
                                                    • API String ID: 3393021363-188983378
                                                    • Opcode ID: 8f97009b1bf37824170bfd28a55259835aaf6cf29f8ea0c932b2b617a2771f3f
                                                    • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
                                                    • Opcode Fuzzy Hash: 8f97009b1bf37824170bfd28a55259835aaf6cf29f8ea0c932b2b617a2771f3f
                                                    • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
                                                    APIs
                                                    • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
                                                    • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
                                                    • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
                                                    • FindClose.KERNEL32(00000000), ref: 00431B20
                                                    • FindClose.KERNEL32(00000000), ref: 00431B34
                                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
                                                    • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
                                                    • FindClose.KERNEL32(00000000), ref: 00431BCD
                                                    • FindClose.KERNEL32(00000000), ref: 00431BDB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                    • String ID: *.*
                                                    • API String ID: 1409584000-438819550
                                                    • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                                    • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
                                                    • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                                    • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
                                                    APIs
                                                    • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
                                                    • __swprintf.LIBCMT ref: 00431C2E
                                                    • _wcslen.LIBCMT ref: 00431C3A
                                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
                                                    • String ID: :$\$\??\%s
                                                    • API String ID: 2192556992-3457252023
                                                    • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                                    • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
                                                    • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                                    • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
                                                    APIs
                                                    • GetLocalTime.KERNEL32(?), ref: 004722A2
                                                    • __swprintf.LIBCMT ref: 004722B9
                                                    • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
                                                    • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
                                                    • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
                                                    • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
                                                    • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
                                                    • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
                                                    • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
                                                    • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
                                                    • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: FolderPath$LocalTime__swprintf
                                                    • String ID: %.3d
                                                    • API String ID: 3337348382-986655627
                                                    • Opcode ID: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                                                    • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
                                                    • Opcode Fuzzy Hash: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                                                    • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
                                                    APIs
                                                    • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
                                                    • FindClose.KERNEL32(00000000), ref: 0044291C
                                                    • FindClose.KERNEL32(00000000), ref: 00442930
                                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
                                                    • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
                                                    • FindClose.KERNEL32(00000000), ref: 004429D4
                                                      • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
                                                    • FindClose.KERNEL32(00000000), ref: 004429E2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                    • String ID: *.*
                                                    • API String ID: 2640511053-438819550
                                                    • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                                    • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
                                                    • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                                    • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
                                                    • GetLastError.KERNEL32 ref: 00433414
                                                    • ExitWindowsEx.USER32(?,00000000), ref: 00433437
                                                    • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
                                                    • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
                                                    • String ID: SeShutdownPrivilege
                                                    • API String ID: 2938487562-3733053543
                                                    • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                                    • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
                                                    • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                                    • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
                                                    APIs
                                                      • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
                                                      • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
                                                      • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
                                                      • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
                                                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
                                                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
                                                    • GetLengthSid.ADVAPI32(?), ref: 004461D0
                                                    • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
                                                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
                                                    • GetLengthSid.ADVAPI32(?), ref: 00446241
                                                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
                                                    • CopySid.ADVAPI32(00000000), ref: 00446271
                                                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
                                                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
                                                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                    • String ID:
                                                    • API String ID: 1255039815-0
                                                    • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                                    • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
                                                    • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                                    • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
                                                    APIs
                                                    • __swprintf.LIBCMT ref: 00433073
                                                    • __swprintf.LIBCMT ref: 00433085
                                                    • __wcsicoll.LIBCMT ref: 00433092
                                                    • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
                                                    • LoadResource.KERNEL32(?,00000000), ref: 004330BD
                                                    • LockResource.KERNEL32(00000000), ref: 004330CA
                                                    • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
                                                    • LoadResource.KERNEL32(?,00000000), ref: 00433105
                                                    • SizeofResource.KERNEL32(?,00000000), ref: 00433114
                                                    • LockResource.KERNEL32(?), ref: 00433120
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
                                                    • String ID:
                                                    • API String ID: 1158019794-0
                                                    • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                                    • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
                                                    • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                                    • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                    • String ID:
                                                    • API String ID: 1737998785-0
                                                    • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                                    • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
                                                    • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                                    • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D627
                                                    • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
                                                    • GetLastError.KERNEL32 ref: 0045D6BF
                                                    • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Error$Mode$DiskFreeLastSpace
                                                    • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                    • API String ID: 4194297153-14809454
                                                    • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                                    • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
                                                    • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                                    • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _memmove$_strncmp
                                                    • String ID: @oH$\$^$h
                                                    • API String ID: 2175499884-3701065813
                                                    • Opcode ID: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                                                    • Instruction ID: 796dcd1322dc9123c5f4e5533c800aedaabe8dca19c5b95ba0af32eff2573e22
                                                    • Opcode Fuzzy Hash: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                                                    • Instruction Fuzzy Hash: 4242E170E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD856AB351D7399946CF55
                                                    APIs
                                                    • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 0046530D
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
                                                    • bind.WSOCK32(00000000,?,00000010), ref: 00465356
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 00465363
                                                    • closesocket.WSOCK32(00000000,00000000), ref: 00465377
                                                    • listen.WSOCK32(00000000,00000005), ref: 00465381
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
                                                    • closesocket.WSOCK32(00000000,00000000), ref: 004653BD
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$closesocket$bindlistensocket
                                                    • String ID:
                                                    • API String ID: 540024437-0
                                                    • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                                    • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
                                                    • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                                    • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: ERCP$VUUU$VUUU$VUUU$XjH
                                                    • API String ID: 0-2872873767
                                                    • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                                    • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
                                                    • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                                    • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
                                                    APIs
                                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
                                                    • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
                                                    • __wsplitpath.LIBCMT ref: 00475644
                                                      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                    • _wcscat.LIBCMT ref: 00475657
                                                    • __wcsicoll.LIBCMT ref: 0047567B
                                                    • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
                                                    • CloseHandle.KERNEL32(00000000), ref: 004756BA
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                                                    • String ID:
                                                    • API String ID: 2547909840-0
                                                    • Opcode ID: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                                    • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
                                                    • Opcode Fuzzy Hash: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                                    • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
                                                    APIs
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
                                                    • Sleep.KERNEL32(0000000A), ref: 0045250B
                                                    • FindNextFileW.KERNEL32(?,?), ref: 004525E9
                                                    • FindClose.KERNEL32(?), ref: 004525FF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
                                                    • String ID: *.*$\VH
                                                    • API String ID: 2786137511-2657498754
                                                    • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                                    • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
                                                    • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                                    • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
                                                    APIs
                                                    • IsDebuggerPresent.KERNEL32 ref: 00421FC1
                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
                                                    • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
                                                    • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
                                                    • TerminateProcess.KERNEL32(00000000), ref: 00422004
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                    • String ID: pqI
                                                    • API String ID: 2579439406-2459173057
                                                    • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                                    • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
                                                    • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                                    • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
                                                    APIs
                                                    • __wcsicoll.LIBCMT ref: 00433349
                                                    • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
                                                    • __wcsicoll.LIBCMT ref: 00433375
                                                    • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: __wcsicollmouse_event
                                                    • String ID: DOWN
                                                    • API String ID: 1033544147-711622031
                                                    • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                                    • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
                                                    • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                                    • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
                                                    APIs
                                                    • GetKeyboardState.USER32(?), ref: 0044C3D2
                                                    • SetKeyboardState.USER32(00000080), ref: 0044C3F6
                                                    • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
                                                    • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
                                                    • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: KeyboardMessagePostState$InputSend
                                                    • String ID:
                                                    • API String ID: 3031425849-0
                                                    • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                                    • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
                                                    • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                                    • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
                                                    APIs
                                                      • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                                    • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 0047666F
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 00476692
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastinet_addrsocket
                                                    • String ID:
                                                    • API String ID: 4170576061-0
                                                    • Opcode ID: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                                    • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
                                                    • Opcode Fuzzy Hash: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                                    • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
                                                    APIs
                                                      • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                                    • IsWindowVisible.USER32 ref: 0047A368
                                                    • IsWindowEnabled.USER32 ref: 0047A378
                                                    • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
                                                    • IsIconic.USER32 ref: 0047A393
                                                    • IsZoomed.USER32 ref: 0047A3A1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                    • String ID:
                                                    • API String ID: 292994002-0
                                                    • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                                    • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
                                                    • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                                    • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
                                                    APIs
                                                    • OpenClipboard.USER32(?), ref: 0046DCE7
                                                    • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                                    • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                                    • CloseClipboard.USER32 ref: 0046DD0D
                                                    • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                                    • CloseClipboard.USER32 ref: 0046DD41
                                                    • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                                    • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                                    • CloseClipboard.USER32 ref: 0046DD99
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                                    • String ID:
                                                    • API String ID: 15083398-0
                                                    • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                                    • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
                                                    • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                                    • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: U$\
                                                    • API String ID: 4104443479-100911408
                                                    • Opcode ID: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                                    • Instruction ID: 961864e7757f6edfa256f53df2fe8495351bb1c33360f7104140ceff5b52ad59
                                                    • Opcode Fuzzy Hash: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                                    • Instruction Fuzzy Hash: 7002A070E002499FEF28CF69C4907AEBBF2AF95304F2481AED45297381D7396D4ACB55
                                                    APIs
                                                    • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
                                                    • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Find$File$CloseFirstNext
                                                    • String ID:
                                                    • API String ID: 3541575487-0
                                                    • Opcode ID: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
                                                    • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
                                                    • Opcode Fuzzy Hash: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
                                                    • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
                                                    APIs
                                                    • GetFileAttributesW.KERNEL32(?,00000000), ref: 004339C7
                                                    • FindFirstFileW.KERNEL32(?,?), ref: 004339D8
                                                    • FindClose.KERNEL32(00000000), ref: 004339EB
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: FileFind$AttributesCloseFirst
                                                    • String ID:
                                                    • API String ID: 48322524-0
                                                    • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                                    • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
                                                    • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                                    • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
                                                    APIs
                                                    • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
                                                    • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
                                                      • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Internet$AvailableDataErrorFileLastQueryRead
                                                    • String ID:
                                                    • API String ID: 901099227-0
                                                    • Opcode ID: b48fbef154557e42056369557a390c5e15e1cd9efc8ac9760c34eb316c367bda
                                                    • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
                                                    • Opcode Fuzzy Hash: b48fbef154557e42056369557a390c5e15e1cd9efc8ac9760c34eb316c367bda
                                                    • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
                                                    APIs
                                                    • DefDlgProcW.USER32(?,?,?,?), ref: 0047EA9E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Proc
                                                    • String ID:
                                                    • API String ID: 2346855178-0
                                                    • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                                    • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
                                                    • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                                    • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
                                                    APIs
                                                    • BlockInput.USER32(00000001), ref: 0045A38B
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: BlockInput
                                                    • String ID:
                                                    • API String ID: 3456056419-0
                                                    • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                                    • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
                                                    • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                                    • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
                                                    APIs
                                                    • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: LogonUser
                                                    • String ID:
                                                    • API String ID: 1244722697-0
                                                    • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                                    • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
                                                    • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                                    • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
                                                    APIs
                                                    • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: NameUser
                                                    • String ID:
                                                    • API String ID: 2645101109-0
                                                    • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                                    • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
                                                    • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                                    • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
                                                    APIs
                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ExceptionFilterUnhandled
                                                    • String ID:
                                                    • API String ID: 3192549508-0
                                                    • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                                    • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
                                                    • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                                    • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: N@
                                                    • API String ID: 0-1509896676
                                                    • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                                    • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
                                                    • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                                    • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                                    • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
                                                    • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                                    • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                                    • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
                                                    • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                                    • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                                    • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
                                                    • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                                    • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                                    • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
                                                    • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                                    • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1406562832.0000000003FC5000.00000040.00000020.00020000.00000000.sdmp, Offset: 03FC5000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3fc5000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                    • Instruction ID: a44d20a563f3d8f9d3296e13e50569746dc848f3b382c28fa494044ff14f81c5
                                                    • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                    • Instruction Fuzzy Hash: 3D41C171D1051CEBCF48CFADC991AEEBBF2AF88201F548299D516AB345D730AB41DB80
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1406562832.0000000003FC5000.00000040.00000020.00020000.00000000.sdmp, Offset: 03FC5000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3fc5000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                    • Instruction ID: f22f77dadea20b2b5f0ed605b9ffe1fa4d10b8d76c10ad713d2e49bc5a76e785
                                                    • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                    • Instruction Fuzzy Hash: D6019278E1024AEFCB44DF98C6909AEF7B5FF48350F248599D809A7341D730AE41DB80
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1406562832.0000000003FC5000.00000040.00000020.00020000.00000000.sdmp, Offset: 03FC5000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3fc5000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                    • Instruction ID: 900c709e437e0cb2ddeee315ecff81a2fd96279c085199ec54304f45c8ec6244
                                                    • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                    • Instruction Fuzzy Hash: 6C019278E1024AEFCB44DF98C6909AEF7F5FB48350F208599D809A7341D731AE41DB80
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1406562832.0000000003FC5000.00000040.00000020.00020000.00000000.sdmp, Offset: 03FC5000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3fc5000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                    • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                                    • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                    • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                                    APIs
                                                    • DeleteObject.GDI32(?), ref: 0045953B
                                                    • DeleteObject.GDI32(?), ref: 00459551
                                                    • DestroyWindow.USER32(?), ref: 00459563
                                                    • GetDesktopWindow.USER32 ref: 00459581
                                                    • GetWindowRect.USER32(00000000), ref: 00459588
                                                    • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
                                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
                                                    • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
                                                    • GetClientRect.USER32(00000000,?), ref: 004596F8
                                                    • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
                                                    • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
                                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
                                                    • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
                                                    • GlobalLock.KERNEL32(00000000), ref: 0045978F
                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
                                                    • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
                                                    • CloseHandle.KERNEL32(00000000), ref: 004597AC
                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
                                                    • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
                                                    • GlobalFree.KERNEL32(00000000), ref: 004597E2
                                                    • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
                                                    • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
                                                    • ShowWindow.USER32(?,00000004), ref: 00459865
                                                    • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
                                                    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
                                                    • GetStockObject.GDI32(00000011), ref: 004598CD
                                                    • SelectObject.GDI32(00000000,00000000), ref: 004598D5
                                                    • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004598EE
                                                    • DeleteDC.GDI32(00000000), ref: 004598F8
                                                    • _wcslen.LIBCMT ref: 00459916
                                                    • _wcscpy.LIBCMT ref: 0045993A
                                                    • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
                                                    • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
                                                    • GetDC.USER32(00000000), ref: 004599FC
                                                    • SelectObject.GDI32(00000000,?), ref: 00459A0C
                                                    • SelectObject.GDI32(00000000,00000007), ref: 00459A37
                                                    • ReleaseDC.USER32(00000000,00000000), ref: 00459A42
                                                    • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
                                                    • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
                                                    • String ID: $AutoIt v3$DISPLAY$static
                                                    • API String ID: 4040870279-2373415609
                                                    • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                                    • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
                                                    • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                                    • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
                                                    APIs
                                                    • GetSysColor.USER32(00000012), ref: 0044181E
                                                    • SetTextColor.GDI32(?,?), ref: 00441826
                                                    • GetSysColorBrush.USER32(0000000F), ref: 0044183D
                                                    • GetSysColor.USER32(0000000F), ref: 00441849
                                                    • SetBkColor.GDI32(?,?), ref: 00441864
                                                    • SelectObject.GDI32(?,?), ref: 00441874
                                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
                                                    • GetSysColor.USER32(00000010), ref: 004418B2
                                                    • CreateSolidBrush.GDI32(00000000), ref: 004418B9
                                                    • FrameRect.USER32(?,?,00000000), ref: 004418CA
                                                    • DeleteObject.GDI32(?), ref: 004418D5
                                                    • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
                                                    • FillRect.USER32(?,?,?), ref: 00441970
                                                      • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
                                                      • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
                                                      • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                                      • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
                                                      • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
                                                      • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                                      • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
                                                      • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
                                                      • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
                                                      • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                                      • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                                      • Part of subcall function 004308EF: GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                                      • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
                                                    • String ID:
                                                    • API String ID: 69173610-0
                                                    • Opcode ID: fbb8d870229eb44a1def9ba3881ac6b42e654f1da7cb1ff5097cb3e0d6ff825e
                                                    • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
                                                    • Opcode Fuzzy Hash: fbb8d870229eb44a1def9ba3881ac6b42e654f1da7cb1ff5097cb3e0d6ff825e
                                                    • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
                                                    APIs
                                                    • DestroyWindow.USER32(?), ref: 004590F2
                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
                                                    • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
                                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
                                                    • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
                                                    • GetClientRect.USER32(00000000,?), ref: 0045924E
                                                    • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
                                                    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
                                                    • GetStockObject.GDI32(00000011), ref: 004592AC
                                                    • SelectObject.GDI32(00000000,00000000), ref: 004592B4
                                                    • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004592CD
                                                    • DeleteDC.GDI32(00000000), ref: 004592D6
                                                    • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
                                                    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
                                                    • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
                                                    • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
                                                    • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
                                                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
                                                    • GetStockObject.GDI32(00000011), ref: 004593D3
                                                    • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
                                                    • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                    • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                    • API String ID: 2910397461-517079104
                                                    • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                                    • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
                                                    • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                                    • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: __wcsnicmp
                                                    • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                                                    • API String ID: 1038674560-3360698832
                                                    • Opcode ID: 23f0f58ea95d18462155f90075fe93dcb11182f556a84baaa607307f542fa917
                                                    • Instruction ID: 9c7d50a5cd0ee83047e92bfb3361563e61671b380f2e7b4b5fccf758bfaba57c
                                                    • Opcode Fuzzy Hash: 23f0f58ea95d18462155f90075fe93dcb11182f556a84baaa607307f542fa917
                                                    • Instruction Fuzzy Hash: B5610670701621B7D711AE219C42FAF335C9F50705F50442BFE05AA286FB7DEE8686AE
                                                    APIs
                                                    • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
                                                    • SetCursor.USER32(00000000), ref: 0043075B
                                                    • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
                                                    • SetCursor.USER32(00000000), ref: 00430773
                                                    • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
                                                    • SetCursor.USER32(00000000), ref: 0043078B
                                                    • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
                                                    • SetCursor.USER32(00000000), ref: 004307A3
                                                    • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
                                                    • SetCursor.USER32(00000000), ref: 004307BB
                                                    • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
                                                    • SetCursor.USER32(00000000), ref: 004307D3
                                                    • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
                                                    • SetCursor.USER32(00000000), ref: 004307EB
                                                    • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
                                                    • SetCursor.USER32(00000000), ref: 00430803
                                                    • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
                                                    • SetCursor.USER32(00000000), ref: 0043081B
                                                    • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
                                                    • SetCursor.USER32(00000000), ref: 00430833
                                                    • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
                                                    • SetCursor.USER32(00000000), ref: 0043084B
                                                    • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
                                                    • SetCursor.USER32(00000000), ref: 00430863
                                                    • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
                                                    • SetCursor.USER32(00000000), ref: 0043087B
                                                    • SetCursor.USER32(00000000), ref: 00430887
                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
                                                    • SetCursor.USER32(00000000), ref: 0043089F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Cursor$Load
                                                    • String ID:
                                                    • API String ID: 1675784387-0
                                                    • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                                    • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
                                                    • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                                    • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
                                                    APIs
                                                    • GetSysColor.USER32(0000000E), ref: 00430913
                                                    • SetTextColor.GDI32(?,00000000), ref: 0043091B
                                                    • GetSysColor.USER32(00000012), ref: 00430933
                                                    • SetTextColor.GDI32(?,?), ref: 0043093B
                                                    • GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                                    • GetSysColor.USER32(0000000F), ref: 00430959
                                                    • CreateSolidBrush.GDI32(?), ref: 00430962
                                                    • GetSysColor.USER32(00000011), ref: 00430979
                                                    • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                                    • SelectObject.GDI32(?,00000000), ref: 0043099C
                                                    • SetBkColor.GDI32(?,?), ref: 004309A6
                                                    • SelectObject.GDI32(?,?), ref: 004309B4
                                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                                    • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                                    • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
                                                    • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
                                                    • DrawFocusRect.USER32(?,?), ref: 00430A91
                                                    • GetSysColor.USER32(00000011), ref: 00430A9F
                                                    • SetTextColor.GDI32(?,00000000), ref: 00430AA7
                                                    • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
                                                    • SelectObject.GDI32(?,?), ref: 00430AD0
                                                    • DeleteObject.GDI32(00000105), ref: 00430ADC
                                                    • SelectObject.GDI32(?,?), ref: 00430AE3
                                                    • DeleteObject.GDI32(?), ref: 00430AE9
                                                    • SetTextColor.GDI32(?,?), ref: 00430AF0
                                                    • SetBkColor.GDI32(?,?), ref: 00430AFB
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                    • String ID:
                                                    • API String ID: 1582027408-0
                                                    • Opcode ID: 550e896c7567608c30fce12d6ed7134b72d55419159f0474b5285c649df46e98
                                                    • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
                                                    • Opcode Fuzzy Hash: 550e896c7567608c30fce12d6ed7134b72d55419159f0474b5285c649df46e98
                                                    • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
                                                    APIs
                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
                                                    • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
                                                    • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: CloseConnectCreateRegistry
                                                    • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                    • API String ID: 3217815495-966354055
                                                    • Opcode ID: c70c32215588f8ec8bb03fc6aa478a266b625616447da64362da41b73b816162
                                                    • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
                                                    • Opcode Fuzzy Hash: c70c32215588f8ec8bb03fc6aa478a266b625616447da64362da41b73b816162
                                                    • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
                                                    APIs
                                                    • GetCursorPos.USER32(?), ref: 004566AE
                                                    • GetDesktopWindow.USER32 ref: 004566C3
                                                    • GetWindowRect.USER32(00000000), ref: 004566CA
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00456722
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00456735
                                                    • DestroyWindow.USER32(?), ref: 00456746
                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
                                                    • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
                                                    • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
                                                    • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
                                                    • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
                                                    • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
                                                    • IsWindowVisible.USER32(?), ref: 0045682C
                                                    • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
                                                    • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
                                                    • GetWindowRect.USER32(?,?), ref: 00456873
                                                    • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
                                                    • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
                                                    • CopyRect.USER32(?,?), ref: 004568BE
                                                    • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: MessageSendWindow$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
                                                    • String ID: ($,$tooltips_class32
                                                    • API String ID: 225202481-3320066284
                                                    • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                                    • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
                                                    • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                                    • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
                                                    APIs
                                                    • OpenClipboard.USER32(?), ref: 0046DCE7
                                                    • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                                    • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                                    • CloseClipboard.USER32 ref: 0046DD0D
                                                    • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                                    • CloseClipboard.USER32 ref: 0046DD41
                                                    • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                                    • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                                    • CloseClipboard.USER32 ref: 0046DD99
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                                    • String ID:
                                                    • API String ID: 15083398-0
                                                    • Opcode ID: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                                                    • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
                                                    • Opcode Fuzzy Hash: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                                                    • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
                                                    APIs
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • GetWindowRect.USER32(?,?), ref: 00471CF7
                                                    • GetClientRect.USER32(?,?), ref: 00471D05
                                                    • GetSystemMetrics.USER32(00000007), ref: 00471D0D
                                                    • GetSystemMetrics.USER32(00000008), ref: 00471D20
                                                    • GetSystemMetrics.USER32(00000004), ref: 00471D42
                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
                                                    • GetSystemMetrics.USER32(00000007), ref: 00471D79
                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
                                                    • GetSystemMetrics.USER32(00000008), ref: 00471DAB
                                                    • GetSystemMetrics.USER32(00000004), ref: 00471DCF
                                                    • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
                                                    • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
                                                    • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 00471E35
                                                    • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00471E6E
                                                    • GetClientRect.USER32(?,?), ref: 00471E8A
                                                    • GetStockObject.GDI32(00000011), ref: 00471EA6
                                                    • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
                                                    • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
                                                    • String ID: @$AutoIt v3 GUI
                                                    • API String ID: 867697134-3359773793
                                                    • Opcode ID: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
                                                    • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
                                                    • Opcode Fuzzy Hash: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
                                                    • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
                                                    • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                    • API String ID: 1503153545-1459072770
                                                    • Opcode ID: 76acf26b61918e0ebafe3e9c460c5efedcc98b6992261bc6c4f6588f91b2aee1
                                                    • Instruction ID: bf9a9138137c8e48d15734b0b0bf1383f69a7efb75f9ce998fc77f2ad016157b
                                                    • Opcode Fuzzy Hash: 76acf26b61918e0ebafe3e9c460c5efedcc98b6992261bc6c4f6588f91b2aee1
                                                    • Instruction Fuzzy Hash: D551F672A402043BD610BB269C43EFFB36C9F49715F10055FFE09A6242EA7DEA5183AD
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: __wcsicoll$__wcsnicmp
                                                    • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
                                                    • API String ID: 790654849-32604322
                                                    • Opcode ID: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                                    • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
                                                    • Opcode Fuzzy Hash: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                                    • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7b3c0986a6774ad4839bdf3b3ab280162fe8917d12771473e04c5712f0602a0a
                                                    • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
                                                    • Opcode Fuzzy Hash: 7b3c0986a6774ad4839bdf3b3ab280162fe8917d12771473e04c5712f0602a0a
                                                    • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
                                                    APIs
                                                      • Part of subcall function 00442C5A: __time64.LIBCMT ref: 00442C66
                                                    • _fseek.LIBCMT ref: 00452B3B
                                                    • __wsplitpath.LIBCMT ref: 00452B9B
                                                    • _wcscpy.LIBCMT ref: 00452BB0
                                                    • _wcscat.LIBCMT ref: 00452BC5
                                                    • __wsplitpath.LIBCMT ref: 00452BEF
                                                    • _wcscat.LIBCMT ref: 00452C07
                                                    • _wcscat.LIBCMT ref: 00452C1C
                                                    • __fread_nolock.LIBCMT ref: 00452C53
                                                    • __fread_nolock.LIBCMT ref: 00452C64
                                                    • __fread_nolock.LIBCMT ref: 00452C83
                                                    • __fread_nolock.LIBCMT ref: 00452C94
                                                    • __fread_nolock.LIBCMT ref: 00452CB5
                                                    • __fread_nolock.LIBCMT ref: 00452CC6
                                                    • __fread_nolock.LIBCMT ref: 00452CD7
                                                    • __fread_nolock.LIBCMT ref: 00452CE8
                                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                                      • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                                      • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                                                    • __fread_nolock.LIBCMT ref: 00452D78
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
                                                    • String ID:
                                                    • API String ID: 2054058615-0
                                                    • Opcode ID: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
                                                    • Instruction ID: 04d0e47ed4a2b248740d2851a73093f1b496c65d3ae4d984919b8c0089c9d159
                                                    • Opcode Fuzzy Hash: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
                                                    • Instruction Fuzzy Hash: 6FC14EB2508340ABD720DF65D881EEFB7E8EFC9704F40492FF68987241E6759548CB66
                                                    APIs
                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Window
                                                    • String ID: 0
                                                    • API String ID: 2353593579-4108050209
                                                    • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                                    • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
                                                    • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                                    • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
                                                    APIs
                                                    • GetSysColor.USER32(0000000F), ref: 0044A05E
                                                    • GetClientRect.USER32(?,?), ref: 0044A0D1
                                                    • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
                                                    • GetWindowDC.USER32(?), ref: 0044A0F6
                                                    • GetPixel.GDI32(00000000,?,?), ref: 0044A108
                                                    • ReleaseDC.USER32(?,?), ref: 0044A11B
                                                    • GetSysColor.USER32(0000000F), ref: 0044A131
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 0044A140
                                                    • GetSysColor.USER32(0000000F), ref: 0044A14F
                                                    • GetSysColor.USER32(00000005), ref: 0044A15B
                                                    • GetWindowDC.USER32(?), ref: 0044A1BE
                                                    • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
                                                    • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
                                                    • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
                                                    • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
                                                    • ReleaseDC.USER32(?,00000000), ref: 0044A229
                                                    • SetBkColor.GDI32(?,00000000), ref: 0044A24C
                                                    • GetSysColor.USER32(00000008), ref: 0044A265
                                                    • SetTextColor.GDI32(?,00000000), ref: 0044A270
                                                    • SetBkMode.GDI32(?,00000001), ref: 0044A282
                                                    • GetStockObject.GDI32(00000005), ref: 0044A28A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
                                                    • String ID:
                                                    • API String ID: 1744303182-0
                                                    • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                                    • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
                                                    • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                                    • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
                                                    • __mtterm.LIBCMT ref: 00417C34
                                                      • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
                                                      • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
                                                      • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
                                                      • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000017,00410E44,?,00417D96,?,004164DE), ref: 004181E2
                                                    • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
                                                    • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
                                                    • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
                                                    • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
                                                    • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
                                                    • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
                                                    • __init_pointers.LIBCMT ref: 00417CE6
                                                    • __calloc_crt.LIBCMT ref: 00417D54
                                                    • GetCurrentThreadId.KERNEL32 ref: 00417D80
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                                                    • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                                    • API String ID: 4163708885-3819984048
                                                    • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                                    • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
                                                    • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                                    • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: >>>AUTOIT SCRIPT<<<$\
                                                    • API String ID: 0-1896584978
                                                    • Opcode ID: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
                                                    • Instruction ID: daa296ce3da71eb1ea4b2d74bac6de3536c6b190185545f0361092b1072d42a3
                                                    • Opcode Fuzzy Hash: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
                                                    • Instruction Fuzzy Hash: 4081B9B1900204ABCB20EB61CD85FDB73ED9F54304F40859EF505AB142EA39EA85CB99
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: __wcsicoll$IconLoad
                                                    • String ID: blank$info$question$stop$warning
                                                    • API String ID: 2485277191-404129466
                                                    • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                                    • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
                                                    • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                                    • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
                                                    APIs
                                                    • LoadIconW.USER32(?,00000063), ref: 0045464C
                                                    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
                                                    • SetWindowTextW.USER32(?,?), ref: 00454678
                                                    • GetDlgItem.USER32(?,000003EA), ref: 00454690
                                                    • SetWindowTextW.USER32(00000000,?), ref: 00454697
                                                    • GetDlgItem.USER32(?,000003E9), ref: 004546A8
                                                    • SetWindowTextW.USER32(00000000,?), ref: 004546AF
                                                    • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
                                                    • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
                                                    • GetWindowRect.USER32(?,?), ref: 004546F5
                                                    • SetWindowTextW.USER32(?,?), ref: 00454765
                                                    • GetDesktopWindow.USER32 ref: 0045476F
                                                    • GetWindowRect.USER32(00000000), ref: 00454776
                                                    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
                                                    • GetClientRect.USER32(?,?), ref: 004547D2
                                                    • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
                                                    • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                    • String ID:
                                                    • API String ID: 3869813825-0
                                                    • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                                    • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
                                                    • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                                    • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
                                                    APIs
                                                    • _wcslen.LIBCMT ref: 00464B28
                                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
                                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
                                                    • _wcslen.LIBCMT ref: 00464C28
                                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
                                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
                                                    • _wcslen.LIBCMT ref: 00464CBA
                                                    • _wcslen.LIBCMT ref: 00464CD0
                                                    • _wcslen.LIBCMT ref: 00464CEF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$Directory$CurrentSystem
                                                    • String ID: D
                                                    • API String ID: 1914653954-2746444292
                                                    • Opcode ID: 44be7054643fd4ba856d6b2e359bfbfbb3de9f7e14d5395c76b411fe07bee919
                                                    • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
                                                    • Opcode Fuzzy Hash: 44be7054643fd4ba856d6b2e359bfbfbb3de9f7e14d5395c76b411fe07bee919
                                                    • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: __wcsicoll
                                                    • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                                                    • API String ID: 3832890014-4202584635
                                                    • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                                    • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
                                                    • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                                    • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
                                                    APIs
                                                    • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
                                                    • GetFocus.USER32 ref: 0046A0DD
                                                    • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
                                                    • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: MessagePost$CtrlFocus
                                                    • String ID: 0
                                                    • API String ID: 1534620443-4108050209
                                                    • Opcode ID: d1db05db4fd2a56646a253bb82972057caa917eb73d061b61dca20a17b51d953
                                                    • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
                                                    • Opcode Fuzzy Hash: d1db05db4fd2a56646a253bb82972057caa917eb73d061b61dca20a17b51d953
                                                    • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
                                                    APIs
                                                    • DestroyWindow.USER32(?), ref: 004558E3
                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0045592C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Window$CreateDestroy
                                                    • String ID: ,$tooltips_class32
                                                    • API String ID: 1109047481-3856767331
                                                    • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                                    • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
                                                    • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                                    • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
                                                    APIs
                                                    • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
                                                    • GetMenuItemCount.USER32(?), ref: 00468C45
                                                    • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
                                                    • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
                                                    • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
                                                    • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
                                                    • GetMenuItemCount.USER32 ref: 00468CFD
                                                    • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
                                                    • GetCursorPos.USER32(?), ref: 00468D3F
                                                    • SetForegroundWindow.USER32(?), ref: 00468D49
                                                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
                                                    • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
                                                    • String ID: 0
                                                    • API String ID: 1441871840-4108050209
                                                    • Opcode ID: 07587df8a471d518792fccb5aa1665f6bc623426d2a925fe0db1080b86145506
                                                    • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
                                                    • Opcode Fuzzy Hash: 07587df8a471d518792fccb5aa1665f6bc623426d2a925fe0db1080b86145506
                                                    • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                                    • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                                    • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                                    • __swprintf.LIBCMT ref: 00460915
                                                    • __swprintf.LIBCMT ref: 0046092D
                                                    • _wprintf.LIBCMT ref: 004609E1
                                                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
                                                    • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                    • API String ID: 3631882475-2268648507
                                                    • Opcode ID: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                                    • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
                                                    • Opcode Fuzzy Hash: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                                    • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
                                                    APIs
                                                    • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
                                                    • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
                                                    • SendMessageW.USER32 ref: 00471740
                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
                                                    • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
                                                    • ImageList_Create.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
                                                    • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
                                                    • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
                                                    • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
                                                    • SendMessageW.USER32 ref: 0047184F
                                                    • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
                                                    • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
                                                    • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 0047189C
                                                    • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004718A2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Icon$ImageList_$CreateDestroyExtractReplace
                                                    • String ID:
                                                    • API String ID: 4116747274-0
                                                    • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                                    • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
                                                    • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                                    • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
                                                    APIs
                                                    • GetClassNameW.USER32(?,?,00000100), ref: 00461678
                                                    • _wcslen.LIBCMT ref: 00461683
                                                    • __swprintf.LIBCMT ref: 00461721
                                                    • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00461794
                                                    • GetClassNameW.USER32(?,?,00000400), ref: 00461811
                                                    • GetDlgCtrlID.USER32(?), ref: 00461869
                                                    • GetWindowRect.USER32(?,?), ref: 004618A4
                                                    • GetParent.USER32(?), ref: 004618C3
                                                    • ScreenToClient.USER32(00000000), ref: 004618CA
                                                    • GetClassNameW.USER32(?,?,00000100), ref: 00461941
                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 0046197E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
                                                    • String ID: %s%u
                                                    • API String ID: 1899580136-679674701
                                                    • Opcode ID: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                                                    • Instruction ID: 362d1c13b2509f288ecdbc272899e32e1bd8f20a7ba75cfa55bfcaf2deda5cb5
                                                    • Opcode Fuzzy Hash: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                                                    • Instruction Fuzzy Hash: 1DA1B2715043019FDB10DF55C884BAB73A8FF84314F08896EFD899B255E738E94ACBA6
                                                    APIs
                                                    • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FDDB
                                                    • SetMenuItemInfoW.USER32(00000008,00000004,00000000,00000030), ref: 0045FE14
                                                    • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: InfoItemMenu$Sleep
                                                    • String ID: 0
                                                    • API String ID: 1196289194-4108050209
                                                    • Opcode ID: 5de70b745d60c46cef08f56f1a5c3a55b51ac4f0ed049d1ad5198b842cd33ee8
                                                    • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
                                                    • Opcode Fuzzy Hash: 5de70b745d60c46cef08f56f1a5c3a55b51ac4f0ed049d1ad5198b842cd33ee8
                                                    • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
                                                    APIs
                                                    • GetDC.USER32(00000000), ref: 0043143E
                                                    • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043144F
                                                    • CreateCompatibleDC.GDI32(00000000), ref: 00431459
                                                    • SelectObject.GDI32(00000000,?), ref: 00431466
                                                    • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
                                                    • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
                                                    • String ID: (
                                                    • API String ID: 3300687185-3887548279
                                                    • Opcode ID: 54198b849531af9165e9bec096bf8ea3e4974b91d89a9c814b262d795432971a
                                                    • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
                                                    • Opcode Fuzzy Hash: 54198b849531af9165e9bec096bf8ea3e4974b91d89a9c814b262d795432971a
                                                    • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
                                                    APIs
                                                      • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                                      • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                                    • GetDriveTypeW.KERNEL32 ref: 0045DB32
                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
                                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
                                                    • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                    • API String ID: 1976180769-4113822522
                                                    • Opcode ID: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                                    • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
                                                    • Opcode Fuzzy Hash: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                                    • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$_wcsncpy$LocalTime__fassign
                                                    • String ID:
                                                    • API String ID: 461458858-0
                                                    • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                                    • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
                                                    • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                                    • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
                                                    APIs
                                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
                                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
                                                    • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
                                                    • GlobalLock.KERNEL32(00000000), ref: 004300F6
                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
                                                    • CloseHandle.KERNEL32(00000000), ref: 00430113
                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
                                                    • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
                                                    • GlobalFree.KERNEL32(00000000), ref: 00430150
                                                    • GetObjectW.GDI32(?,00000018,?), ref: 00430177
                                                    • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
                                                    • DeleteObject.GDI32(?), ref: 004301D0
                                                    • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                    • String ID:
                                                    • API String ID: 3969911579-0
                                                    • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                                    • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
                                                    • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                                    • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow
                                                    • String ID: 0
                                                    • API String ID: 956284711-4108050209
                                                    • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                                    • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
                                                    • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                                    • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                    • String ID: 0.0.0.0
                                                    • API String ID: 1965227024-3771769585
                                                    • Opcode ID: fae7ff6cb08d49b7abbddf1c7acdf758c3bbd000e7fec019eac0b45bea4aa72c
                                                    • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
                                                    • Opcode Fuzzy Hash: fae7ff6cb08d49b7abbddf1c7acdf758c3bbd000e7fec019eac0b45bea4aa72c
                                                    • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
                                                    APIs
                                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                    • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
                                                    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
                                                    • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
                                                    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
                                                    • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: SendString$_memmove_wcslen
                                                    • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                    • API String ID: 369157077-1007645807
                                                    • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                                    • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
                                                    • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                                    • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
                                                    APIs
                                                    • GetParent.USER32 ref: 00445BF8
                                                    • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
                                                    • __wcsicoll.LIBCMT ref: 00445C33
                                                    • __wcsicoll.LIBCMT ref: 00445C4F
                                                    • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: __wcsicoll$ClassMessageNameParentSend
                                                    • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                    • API String ID: 3125838495-3381328864
                                                    • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                                    • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
                                                    • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                                    • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
                                                    APIs
                                                    • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
                                                    • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
                                                    • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
                                                    • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
                                                    • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
                                                    • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
                                                    • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
                                                    • SendMessageW.USER32(?,00000402,?), ref: 00449399
                                                    • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$CharNext
                                                    • String ID:
                                                    • API String ID: 1350042424-0
                                                    • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                                    • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
                                                    • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                                    • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
                                                    APIs
                                                      • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                                      • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                                    • GetDriveTypeW.KERNEL32(?), ref: 004787B9
                                                    • _wcscpy.LIBCMT ref: 004787E5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: BuffCharDriveLowerType_wcscpy_wcslen
                                                    • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
                                                    • API String ID: 3052893215-2127371420
                                                    • Opcode ID: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                                    • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
                                                    • Opcode Fuzzy Hash: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                                    • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
                                                    APIs
                                                    • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
                                                    • __swprintf.LIBCMT ref: 0045E7F7
                                                    • _wprintf.LIBCMT ref: 0045E8B3
                                                    • _wprintf.LIBCMT ref: 0045E8D7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                                    • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                    • API String ID: 2295938435-2354261254
                                                    • Opcode ID: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                                    • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
                                                    • Opcode Fuzzy Hash: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                                    • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: __swprintf_wcscpy$__i64tow__itow
                                                    • String ID: %.15g$0x%p$False$True
                                                    • API String ID: 3038501623-2263619337
                                                    • Opcode ID: dbd07ee36d68efbdb82b47f6bbdb5a558a403895529f1bd62c5843a789ef215e
                                                    • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
                                                    • Opcode Fuzzy Hash: dbd07ee36d68efbdb82b47f6bbdb5a558a403895529f1bd62c5843a789ef215e
                                                    • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
                                                    APIs
                                                    • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
                                                    • __swprintf.LIBCMT ref: 0045E5F6
                                                    • _wprintf.LIBCMT ref: 0045E6A3
                                                    • _wprintf.LIBCMT ref: 0045E6C7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                                    • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                    • API String ID: 2295938435-8599901
                                                    • Opcode ID: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                                    • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
                                                    • Opcode Fuzzy Hash: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                                    • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
                                                    APIs
                                                    • timeGetTime.WINMM ref: 00443B67
                                                      • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
                                                    • Sleep.KERNEL32(0000000A), ref: 00443B9F
                                                    • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00443BC8
                                                    • SetActiveWindow.USER32(00000000), ref: 00443BEC
                                                    • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
                                                    • SendMessageW.USER32(00000000,00000010,00000000,00000000), ref: 00443C22
                                                    • Sleep.KERNEL32(000000FA), ref: 00443C2D
                                                    • IsWindow.USER32(00000000), ref: 00443C3A
                                                    • EndDialog.USER32(00000000,00000000), ref: 00443C4C
                                                      • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                                      • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                                      • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                                    • EnumThreadWindows.USER32(00000000,Function_00033D09,00000000), ref: 00443C6B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ThreadWindow$MessageSendSleepTimetime$ActiveAttachCurrentDialogEnumFindInputProcessWindows
                                                    • String ID: BUTTON
                                                    • API String ID: 1834419854-3405671355
                                                    • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                                    • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
                                                    • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                                    • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
                                                    • LoadStringW.USER32(00000000), ref: 00454040
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • _wprintf.LIBCMT ref: 00454074
                                                    • __swprintf.LIBCMT ref: 004540A3
                                                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
                                                    • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                    • API String ID: 455036304-4153970271
                                                    • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                                    • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
                                                    • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                                    • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
                                                    APIs
                                                    • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
                                                    • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
                                                    • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
                                                    • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
                                                    • _memmove.LIBCMT ref: 00467EB8
                                                    • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
                                                    • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
                                                    • _memmove.LIBCMT ref: 00467F6C
                                                    • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
                                                    • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
                                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                    • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
                                                    • String ID:
                                                    • API String ID: 2170234536-0
                                                    • Opcode ID: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
                                                    • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
                                                    • Opcode Fuzzy Hash: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
                                                    • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
                                                    APIs
                                                    • GetKeyboardState.USER32(?), ref: 00453CE0
                                                    • SetKeyboardState.USER32(?), ref: 00453D3B
                                                    • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
                                                    • GetKeyState.USER32(000000A0), ref: 00453D75
                                                    • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
                                                    • GetKeyState.USER32(000000A1), ref: 00453DB5
                                                    • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
                                                    • GetKeyState.USER32(00000011), ref: 00453DEF
                                                    • GetAsyncKeyState.USER32(00000012), ref: 00453E18
                                                    • GetKeyState.USER32(00000012), ref: 00453E26
                                                    • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
                                                    • GetKeyState.USER32(0000005B), ref: 00453E5D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: State$Async$Keyboard
                                                    • String ID:
                                                    • API String ID: 541375521-0
                                                    • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                                    • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
                                                    • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                                    • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
                                                    APIs
                                                    • GetDlgItem.USER32(?,00000001), ref: 004357DB
                                                    • GetWindowRect.USER32(00000000,?), ref: 004357ED
                                                    • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
                                                    • GetDlgItem.USER32(?,00000002), ref: 0043586A
                                                    • GetWindowRect.USER32(00000000,?), ref: 0043587C
                                                    • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
                                                    • GetDlgItem.USER32(?,000003E9), ref: 004358DC
                                                    • GetWindowRect.USER32(00000000,?), ref: 004358EE
                                                    • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
                                                    • GetDlgItem.USER32(?,000003EA), ref: 00435941
                                                    • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Window$ItemMoveRect$Invalidate
                                                    • String ID:
                                                    • API String ID: 3096461208-0
                                                    • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                                    • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
                                                    • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                                    • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
                                                    APIs
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 004714DC
                                                    • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
                                                    • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
                                                    • DeleteObject.GDI32(?), ref: 0047151E
                                                    • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,000000F0), ref: 0047152C
                                                    • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
                                                    • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
                                                    • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
                                                    • DestroyIcon.USER32(?,?,?,?,?,?,000000F0), ref: 004715CD
                                                    • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
                                                    • DeleteObject.GDI32(?), ref: 004715EA
                                                    • DestroyIcon.USER32(?,?,000000F7,00000001,?,?,?,?,?,?,000000F0), ref: 004715F8
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Icon$DestroyMessageSend$DeleteImageLoadObject$ExtractLongWindow
                                                    • String ID:
                                                    • API String ID: 3218148540-0
                                                    • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                                    • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
                                                    • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                                    • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                                    • String ID:
                                                    • API String ID: 136442275-0
                                                    • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                                    • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
                                                    • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                                    • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
                                                    APIs
                                                    • _wcsncpy.LIBCMT ref: 00467490
                                                    • _wcsncpy.LIBCMT ref: 004674BC
                                                      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                    • _wcstok.LIBCMT ref: 004674FF
                                                      • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                                    • _wcstok.LIBCMT ref: 004675B2
                                                    • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                                    • _wcslen.LIBCMT ref: 00467793
                                                    • _wcscpy.LIBCMT ref: 00467641
                                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                    • _wcslen.LIBCMT ref: 004677BD
                                                    • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                                      • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$FileName_memmove_wcscpy_wcsncpy_wcstok$OpenSave__getptd
                                                    • String ID: X
                                                    • API String ID: 3104067586-3081909835
                                                    • Opcode ID: bae8ec41c075a4f6a2b7e9f416d910fa80a531229cf5203f8bd385032f306646
                                                    • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
                                                    • Opcode Fuzzy Hash: bae8ec41c075a4f6a2b7e9f416d910fa80a531229cf5203f8bd385032f306646
                                                    • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
                                                    APIs
                                                    • GetClassNameW.USER32(?,?,00000400), ref: 00461056
                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
                                                    • _wcslen.LIBCMT ref: 004610A3
                                                    • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
                                                    • GetClassNameW.USER32(?,?,00000400), ref: 00461124
                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
                                                    • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
                                                    • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
                                                    • GetWindowRect.USER32(?,?), ref: 00461248
                                                      • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
                                                    • String ID: ThumbnailClass
                                                    • API String ID: 4136854206-1241985126
                                                    • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                                    • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
                                                    • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                                    • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
                                                    APIs
                                                    • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
                                                    • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
                                                    • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 00471960
                                                    • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
                                                    • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
                                                    • GetClientRect.USER32(?,?), ref: 00471A1A
                                                    • RedrawWindow.USER32(?,?,00000000,00000000), ref: 00471A29
                                                    • DestroyIcon.USER32(?), ref: 00471AF4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
                                                    • String ID: 2
                                                    • API String ID: 1331449709-450215437
                                                    • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                                    • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
                                                    • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                                    • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                                    • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                                    • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                                    • __swprintf.LIBCMT ref: 00460915
                                                    • __swprintf.LIBCMT ref: 0046092D
                                                    • _wprintf.LIBCMT ref: 004609E1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
                                                    • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
                                                    • API String ID: 3054410614-2561132961
                                                    • Opcode ID: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                                    • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
                                                    • Opcode Fuzzy Hash: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                                    • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
                                                    APIs
                                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                    • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
                                                    • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
                                                    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
                                                    • CLSIDFromString.OLE32(?,?), ref: 004587B3
                                                    • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
                                                    • RegCloseKey.ADVAPI32(?), ref: 004587C5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
                                                    • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                    • API String ID: 600699880-22481851
                                                    • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                                    • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
                                                    • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                                    • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: DestroyWindow
                                                    • String ID: static
                                                    • API String ID: 3375834691-2160076837
                                                    • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                                    • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
                                                    • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                                    • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D959
                                                    • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
                                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$DriveType
                                                    • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
                                                    • API String ID: 2907320926-3566645568
                                                    • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                                    • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
                                                    • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                                    • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
                                                    APIs
                                                      • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                                    • DestroyAcceleratorTable.USER32(?), ref: 0047094A
                                                    • ImageList_Destroy.COMCTL32(?), ref: 004709AD
                                                    • ImageList_Destroy.COMCTL32(?), ref: 004709C5
                                                    • ImageList_Destroy.COMCTL32(?), ref: 004709D5
                                                    • DeleteObject.GDI32(00520000), ref: 00470A04
                                                    • DestroyIcon.USER32(004F0044), ref: 00470A1C
                                                    • DeleteObject.GDI32(F1B9847E), ref: 00470A34
                                                    • DestroyWindow.USER32(006C0061), ref: 00470A4C
                                                    • DestroyIcon.USER32(?), ref: 00470A73
                                                    • DestroyIcon.USER32(?), ref: 00470A81
                                                    • KillTimer.USER32(00000000,00000000), ref: 00470B00
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateKillRectTableTimerWindow
                                                    • String ID:
                                                    • API String ID: 1237572874-0
                                                    • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                                    • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
                                                    • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                                    • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
                                                    APIs
                                                    • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
                                                    • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
                                                    • VariantInit.OLEAUT32(?), ref: 004793E1
                                                    • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
                                                    • VariantCopy.OLEAUT32(?,?), ref: 00479461
                                                    • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
                                                    • VariantClear.OLEAUT32(?), ref: 00479489
                                                    • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
                                                    • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
                                                    • VariantClear.OLEAUT32(?), ref: 004794CA
                                                    • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                    • String ID:
                                                    • API String ID: 2706829360-0
                                                    • Opcode ID: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                                                    • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
                                                    • Opcode Fuzzy Hash: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                                                    • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
                                                    APIs
                                                    • GetKeyboardState.USER32(?), ref: 0044480E
                                                    • GetAsyncKeyState.USER32(000000A0), ref: 00444899
                                                    • GetKeyState.USER32(000000A0), ref: 004448AA
                                                    • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
                                                    • GetKeyState.USER32(000000A1), ref: 004448D9
                                                    • GetAsyncKeyState.USER32(00000011), ref: 004448F5
                                                    • GetKeyState.USER32(00000011), ref: 00444903
                                                    • GetAsyncKeyState.USER32(00000012), ref: 0044491F
                                                    • GetKeyState.USER32(00000012), ref: 0044492D
                                                    • GetAsyncKeyState.USER32(0000005B), ref: 00444949
                                                    • GetKeyState.USER32(0000005B), ref: 00444958
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: State$Async$Keyboard
                                                    • String ID:
                                                    • API String ID: 541375521-0
                                                    • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                                    • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
                                                    • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                                    • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: InitVariant$_malloc_wcscpy_wcslen
                                                    • String ID:
                                                    • API String ID: 3413494760-0
                                                    • Opcode ID: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
                                                    • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
                                                    • Opcode Fuzzy Hash: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
                                                    • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: AddressProc_free_malloc$_strcat_strlen
                                                    • String ID: AU3_FreeVar
                                                    • API String ID: 2634073740-771828931
                                                    • Opcode ID: da08cc041a21d481ca46116ab47081ac4fbb3e56b80667e79e82d75b6ee56f55
                                                    • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
                                                    • Opcode Fuzzy Hash: da08cc041a21d481ca46116ab47081ac4fbb3e56b80667e79e82d75b6ee56f55
                                                    • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
                                                    APIs
                                                    • CoInitialize.OLE32 ref: 0046C63A
                                                    • CoUninitialize.OLE32 ref: 0046C645
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                      • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
                                                      • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
                                                    • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
                                                    • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
                                                    • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
                                                    • IIDFromString.OLE32(?,?), ref: 0046C705
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
                                                    • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                    • API String ID: 2294789929-1287834457
                                                    • Opcode ID: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
                                                    • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
                                                    • Opcode Fuzzy Hash: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
                                                    • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
                                                    APIs
                                                      • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
                                                      • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
                                                      • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
                                                      • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
                                                    • DefDlgProcW.USER32(?,00000205,?,?), ref: 00471145
                                                    • ImageList_DragLeave.COMCTL32(00000000), ref: 00471163
                                                    • ImageList_EndDrag.COMCTL32 ref: 00471169
                                                    • ReleaseCapture.USER32 ref: 0047116F
                                                    • SetWindowTextW.USER32(?,00000000), ref: 00471206
                                                    • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
                                                    • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                    • API String ID: 2483343779-2107944366
                                                    • Opcode ID: 0c0f1ff16893fa866466cf5bd33a163e2c592d09522a7afef5934b76f638d362
                                                    • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
                                                    • Opcode Fuzzy Hash: 0c0f1ff16893fa866466cf5bd33a163e2c592d09522a7afef5934b76f638d362
                                                    • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
                                                    • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
                                                    • _wcslen.LIBCMT ref: 00450720
                                                    • _wcscat.LIBCMT ref: 00450733
                                                    • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
                                                    • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Window_wcscat_wcslen
                                                    • String ID: -----$SysListView32
                                                    • API String ID: 4008455318-3975388722
                                                    • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                                    • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
                                                    • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                                    • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
                                                    APIs
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
                                                    • GetDlgCtrlID.USER32(00000000), ref: 00469C84
                                                    • GetParent.USER32 ref: 00469C98
                                                    • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
                                                    • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
                                                    • GetParent.USER32 ref: 00469CBC
                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$CtrlParent$_memmove_wcslen
                                                    • String ID: ComboBox$ListBox
                                                    • API String ID: 2360848162-1403004172
                                                    • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                                    • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
                                                    • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                                    • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
                                                    • String ID:
                                                    • API String ID: 262282135-0
                                                    • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                                    • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
                                                    • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                                    • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
                                                    APIs
                                                    • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
                                                    • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 004481CF
                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
                                                    • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
                                                    • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
                                                    • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
                                                    • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
                                                    • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
                                                    • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$LongWindow
                                                    • String ID:
                                                    • API String ID: 312131281-0
                                                    • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                                    • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
                                                    • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                                    • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
                                                    APIs
                                                      • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
                                                    • SendMessageW.USER32(75A523D0,00001001,00000000,?), ref: 00448E16
                                                    • SendMessageW.USER32(75A523D0,00001026,00000000,?), ref: 00448E25
                                                      • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$BrushCreateDeleteObjectSolid
                                                    • String ID:
                                                    • API String ID: 3771399671-0
                                                    • Opcode ID: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                                                    • Instruction ID: 7c26134f999fedcb31daf2d1c178305a5bad5d5d588b7e0560cc3c70a69cf84e
                                                    • Opcode Fuzzy Hash: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                                                    • Instruction Fuzzy Hash: C7511570300214ABF720DF24DC85FAE77A9EF14724F10491EFA59AB291CB79E9498B18
                                                    APIs
                                                    • GetCurrentThreadId.KERNEL32 ref: 00434643
                                                    • GetForegroundWindow.USER32(00000000), ref: 00434655
                                                    • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
                                                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
                                                    • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
                                                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
                                                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
                                                    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
                                                    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
                                                    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                    • String ID:
                                                    • API String ID: 2156557900-0
                                                    • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                                    • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
                                                    • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                                    • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                    • API String ID: 0-1603158881
                                                    • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                                    • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
                                                    • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                                    • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
                                                    APIs
                                                    • CreateMenu.USER32 ref: 00448603
                                                    • SetMenu.USER32(?,00000000), ref: 00448613
                                                    • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
                                                    • IsMenu.USER32(?), ref: 004486AB
                                                    • CreatePopupMenu.USER32 ref: 004486B5
                                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
                                                    • DrawMenuBar.USER32 ref: 004486F5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                    • String ID: 0
                                                    • API String ID: 161812096-4108050209
                                                    • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                                    • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
                                                    • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                                    • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe), ref: 00434057
                                                    • LoadStringW.USER32(00000000), ref: 00434060
                                                    • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
                                                    • LoadStringW.USER32(00000000), ref: 00434078
                                                    • _wprintf.LIBCMT ref: 004340A1
                                                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
                                                    Strings
                                                    • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
                                                    • C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe, xrefs: 00434040
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: HandleLoadModuleString$Message_wprintf
                                                    • String ID: %s (%d) : ==> %s: %s %s$C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe
                                                    • API String ID: 3648134473-475884469
                                                    • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                                    • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
                                                    • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                                    • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: dfbce8e1a613c74e072c21ad89e7d3e14579d4917e2b3053f757fec35ca8a5d3
                                                    • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
                                                    • Opcode Fuzzy Hash: dfbce8e1a613c74e072c21ad89e7d3e14579d4917e2b3053f757fec35ca8a5d3
                                                    • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                                                    • Instruction ID: d12da5a9263b129e99c802cec43d72d92cc496201e336192e500ad81068e5f87
                                                    • Opcode Fuzzy Hash: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                                                    • Instruction Fuzzy Hash: D7519C70600305ABEB20DF69CC81F9B77A8AB08715F50462AFE05DB3C1E7B5E8588B58
                                                    APIs
                                                      • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe,0040F545,C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe,004A90E8,C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe,?,0040F545), ref: 0041013C
                                                      • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                    • lstrcmpiW.KERNEL32(?,?), ref: 00453900
                                                    • MoveFileW.KERNEL32(?,?), ref: 00453932
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: File$AttributesFullMoveNamePathlstrcmpi
                                                    • String ID:
                                                    • API String ID: 978794511-0
                                                    • Opcode ID: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                                    • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
                                                    • Opcode Fuzzy Hash: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                                    • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                                    • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
                                                    • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                                    • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ClearVariant
                                                    • String ID:
                                                    • API String ID: 1473721057-0
                                                    • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                                    • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
                                                    • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                                    • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _memmove$_memcmp
                                                    • String ID: '$\$h
                                                    • API String ID: 2205784470-1303700344
                                                    • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                                    • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
                                                    • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                                    • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
                                                    APIs
                                                    • VariantInit.OLEAUT32(00000000), ref: 0045EA56
                                                    • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
                                                    • VariantClear.OLEAUT32 ref: 0045EA6D
                                                    • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
                                                    • __swprintf.LIBCMT ref: 0045EC33
                                                    • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
                                                    Strings
                                                    • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Variant$InitTime$ClearCopySystem__swprintf
                                                    • String ID: %4d%02d%02d%02d%02d%02d
                                                    • API String ID: 2441338619-1568723262
                                                    • Opcode ID: 35eb9c3aeff660f135fd63a8918d5c45c4a90ea0b18b9c33d96ad8571bc730e4
                                                    • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
                                                    • Opcode Fuzzy Hash: 35eb9c3aeff660f135fd63a8918d5c45c4a90ea0b18b9c33d96ad8571bc730e4
                                                    • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
                                                    APIs
                                                    • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
                                                    • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
                                                    • Sleep.KERNEL32(0000000A), ref: 0042C67F
                                                    • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
                                                    • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Interlocked$DecrementIncrement$Sleep
                                                    • String ID: @COM_EVENTOBJ
                                                    • API String ID: 327565842-2228938565
                                                    • Opcode ID: 7a6a6944b375bdcf2396f9f34e6abe7c386284c5530abc4d8420471013998a44
                                                    • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
                                                    • Opcode Fuzzy Hash: 7a6a6944b375bdcf2396f9f34e6abe7c386284c5530abc4d8420471013998a44
                                                    • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
                                                    APIs
                                                    • VariantClear.OLEAUT32(?), ref: 0047031B
                                                    • VariantClear.OLEAUT32(?), ref: 0047044F
                                                    • VariantInit.OLEAUT32(?), ref: 004704A3
                                                    • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
                                                    • VariantClear.OLEAUT32(?), ref: 00470516
                                                      • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
                                                    • VariantCopy.OLEAUT32(?,?), ref: 0047057A
                                                      • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
                                                    • VariantClear.OLEAUT32(00000000), ref: 0047060D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Variant$Clear$Copy$CallDispFuncInit
                                                    • String ID: H
                                                    • API String ID: 3613100350-2852464175
                                                    • Opcode ID: f2b9533c7a0a825d738ebca76906f6301bd96a0988b7340563647801aa66eb79
                                                    • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
                                                    • Opcode Fuzzy Hash: f2b9533c7a0a825d738ebca76906f6301bd96a0988b7340563647801aa66eb79
                                                    • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
                                                    APIs
                                                    • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
                                                    • DestroyWindow.USER32(?), ref: 00426F50
                                                    • UnregisterHotKey.USER32(?), ref: 00426F77
                                                    • FreeLibrary.KERNEL32(?), ref: 0042701F
                                                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
                                                    • String ID: close all
                                                    • API String ID: 4174999648-3243417748
                                                    • Opcode ID: 4fd900de9a28da208b58a3ba22ecdd4c26f042792ef41b4fe823b5ed5eb78ac9
                                                    • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
                                                    • Opcode Fuzzy Hash: 4fd900de9a28da208b58a3ba22ecdd4c26f042792ef41b4fe823b5ed5eb78ac9
                                                    • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
                                                    APIs
                                                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
                                                    • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
                                                    • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
                                                    • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
                                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
                                                    • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
                                                      • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
                                                    • String ID:
                                                    • API String ID: 1291720006-3916222277
                                                    • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                                    • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
                                                    • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                                    • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
                                                    APIs
                                                    • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
                                                    • IsMenu.USER32(?), ref: 0045FC5F
                                                    • CreatePopupMenu.USER32 ref: 0045FC97
                                                    • GetMenuItemCount.USER32(?), ref: 0045FCFD
                                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                    • String ID: 0$2
                                                    • API String ID: 93392585-3793063076
                                                    • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                                    • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
                                                    • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                                    • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
                                                    APIs
                                                    • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
                                                    • VariantClear.OLEAUT32(?), ref: 00435320
                                                    • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
                                                    • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
                                                    • VariantClear.OLEAUT32(?), ref: 004353B3
                                                    • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
                                                    • String ID: crts
                                                    • API String ID: 586820018-3724388283
                                                    • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                                    • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
                                                    • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                                    • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
                                                    APIs
                                                      • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe,0040F545,C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe,004A90E8,C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe,?,0040F545), ref: 0041013C
                                                    • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
                                                    • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
                                                    • _wcscat.LIBCMT ref: 0044BCAF
                                                    • _wcslen.LIBCMT ref: 0044BCBB
                                                    • _wcslen.LIBCMT ref: 0044BCD1
                                                    • SHFileOperationW.SHELL32(?), ref: 0044BD17
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
                                                    • String ID: \*.*
                                                    • API String ID: 2326526234-1173974218
                                                    • Opcode ID: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                                    • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
                                                    • Opcode Fuzzy Hash: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                                    • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
                                                    APIs
                                                      • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
                                                    • _wcslen.LIBCMT ref: 004335F2
                                                    • GetFileAttributesW.KERNEL32(?), ref: 0043361C
                                                    • GetLastError.KERNEL32 ref: 0043362B
                                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
                                                    • _wcsrchr.LIBCMT ref: 00433666
                                                      • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
                                                    • String ID: \
                                                    • API String ID: 321622961-2967466578
                                                    • Opcode ID: bb0dad1fe383a450cc5ca78da39c882eba2540a6c71c70dd25c8590f96c38e52
                                                    • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
                                                    • Opcode Fuzzy Hash: bb0dad1fe383a450cc5ca78da39c882eba2540a6c71c70dd25c8590f96c38e52
                                                    • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: __wcsnicmp
                                                    • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                    • API String ID: 1038674560-2734436370
                                                    • Opcode ID: 8f8f9edfa5db0492502b932a8328ea4ae50c7534afe07431ae24ccbcd5f30aff
                                                    • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
                                                    • Opcode Fuzzy Hash: 8f8f9edfa5db0492502b932a8328ea4ae50c7534afe07431ae24ccbcd5f30aff
                                                    • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
                                                    • __lock.LIBCMT ref: 00417981
                                                      • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
                                                      • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
                                                      • Part of subcall function 004182CB: EnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
                                                    • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
                                                    • __lock.LIBCMT ref: 004179A2
                                                    • ___addlocaleref.LIBCMT ref: 004179C0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                                                    • String ID: KERNEL32.DLL$pI
                                                    • API String ID: 637971194-197072765
                                                    • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                                    • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
                                                    • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                                    • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _memmove$_malloc
                                                    • String ID:
                                                    • API String ID: 1938898002-0
                                                    • Opcode ID: ed671e0929b530e8a80a3994f14b14e6c4fa5d49d1ff8bec0f484948025a4d18
                                                    • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
                                                    • Opcode Fuzzy Hash: ed671e0929b530e8a80a3994f14b14e6c4fa5d49d1ff8bec0f484948025a4d18
                                                    • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
                                                    APIs
                                                    • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
                                                    • EnterCriticalSection.KERNEL32(?), ref: 0044B4F7
                                                    • _memmove.LIBCMT ref: 0044B555
                                                    • _memmove.LIBCMT ref: 0044B578
                                                    • LeaveCriticalSection.KERNEL32(?), ref: 0044B587
                                                    • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
                                                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
                                                    • String ID:
                                                    • API String ID: 2737351978-0
                                                    • Opcode ID: c49c3180d4577c37a1564da55573a5370bada98f09f15d951758cfc7caeaac8d
                                                    • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
                                                    • Opcode Fuzzy Hash: c49c3180d4577c37a1564da55573a5370bada98f09f15d951758cfc7caeaac8d
                                                    • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
                                                    APIs
                                                    • ___set_flsgetvalue.LIBCMT ref: 0041523A
                                                    • __calloc_crt.LIBCMT ref: 00415246
                                                    • __getptd.LIBCMT ref: 00415253
                                                    • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
                                                    • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
                                                    • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
                                                    • _free.LIBCMT ref: 0041529E
                                                    • __dosmaperr.LIBCMT ref: 004152A9
                                                      • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                                    • String ID:
                                                    • API String ID: 3638380555-0
                                                    • Opcode ID: ceb77f577b932ecc061a214adf97d6bda1f2bbbde8b0acc1a90a04adb45bcfac
                                                    • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
                                                    • Opcode Fuzzy Hash: ceb77f577b932ecc061a214adf97d6bda1f2bbbde8b0acc1a90a04adb45bcfac
                                                    • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
                                                    APIs
                                                    • VariantInit.OLEAUT32(?), ref: 0046C96E
                                                      • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                                      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                                      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                                      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                                      • Part of subcall function 00451B42: VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Variant$Copy$ClearErrorInitLast
                                                    • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                    • API String ID: 3207048006-625585964
                                                    • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                                    • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
                                                    • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                                    • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
                                                    APIs
                                                    • WSAStartup.WSOCK32(00000101,?), ref: 00465559
                                                      • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                                    • inet_addr.WSOCK32(?,00000000,?,?), ref: 0046559B
                                                    • gethostbyname.WSOCK32(?), ref: 004655A6
                                                    • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
                                                    • _memmove.LIBCMT ref: 004656CA
                                                    • GlobalFree.KERNEL32(00000000), ref: 0046575C
                                                    • WSACleanup.WSOCK32 ref: 00465762
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
                                                    • String ID:
                                                    • API String ID: 2945290962-0
                                                    • Opcode ID: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                                                    • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
                                                    • Opcode Fuzzy Hash: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                                                    • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
                                                    APIs
                                                    • GetSystemMetrics.USER32(0000000F), ref: 00440527
                                                    • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
                                                    • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
                                                    • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
                                                    • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
                                                    • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440817
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: MessageSendWindow$InvalidateMetricsMoveProcRectShowSystem
                                                    • String ID:
                                                    • API String ID: 1457242333-0
                                                    • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                                    • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
                                                    • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                                    • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
                                                    APIs
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ConnectRegistry_memmove_wcslen
                                                    • String ID:
                                                    • API String ID: 15295421-0
                                                    • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                                    • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
                                                    • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                                    • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
                                                    APIs
                                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                    • _wcstok.LIBCMT ref: 004675B2
                                                      • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                                    • _wcscpy.LIBCMT ref: 00467641
                                                    • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                                    • _wcslen.LIBCMT ref: 00467793
                                                    • _wcslen.LIBCMT ref: 004677BD
                                                      • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                                    • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$FileName_memmove$OpenSave__getptd_wcscpy_wcstok
                                                    • String ID: X
                                                    • API String ID: 780548581-3081909835
                                                    • Opcode ID: 5a7296b1c5eaaf12ad4c2d2a839e078d9dce1648221bbe8eaefb4bf91c000afd
                                                    • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
                                                    • Opcode Fuzzy Hash: 5a7296b1c5eaaf12ad4c2d2a839e078d9dce1648221bbe8eaefb4bf91c000afd
                                                    • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
                                                    APIs
                                                      • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                      • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                      • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                                    • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
                                                    • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
                                                    • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
                                                    • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
                                                    • CloseFigure.GDI32(?), ref: 0044751F
                                                    • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
                                                    • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                                                    • String ID:
                                                    • API String ID: 4082120231-0
                                                    • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                                    • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
                                                    • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                                    • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
                                                    APIs
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
                                                    • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
                                                    • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
                                                    • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
                                                    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
                                                    • RegCloseKey.ADVAPI32(?), ref: 0046B49D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
                                                    • String ID:
                                                    • API String ID: 2027346449-0
                                                    • Opcode ID: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
                                                    • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
                                                    • Opcode Fuzzy Hash: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
                                                    • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
                                                    APIs
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                      • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                                    • GetMenu.USER32 ref: 0047A703
                                                    • GetMenuItemCount.USER32(00000000), ref: 0047A74F
                                                    • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
                                                    • _wcslen.LIBCMT ref: 0047A79E
                                                    • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
                                                    • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
                                                    • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
                                                    • String ID:
                                                    • API String ID: 3257027151-0
                                                    • Opcode ID: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
                                                    • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
                                                    • Opcode Fuzzy Hash: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
                                                    • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
                                                    APIs
                                                    • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastselect
                                                    • String ID:
                                                    • API String ID: 215497628-0
                                                    • Opcode ID: a2339aeea388287f00fab5c9ba0e4a7d07c2007cb3e616b5232981a1bd598a56
                                                    • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
                                                    • Opcode Fuzzy Hash: a2339aeea388287f00fab5c9ba0e4a7d07c2007cb3e616b5232981a1bd598a56
                                                    • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
                                                    APIs
                                                    • GetParent.USER32(?), ref: 0044443B
                                                    • GetKeyboardState.USER32(?), ref: 00444450
                                                    • SetKeyboardState.USER32(?), ref: 004444A4
                                                    • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
                                                    • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
                                                    • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
                                                    • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: MessagePost$KeyboardState$Parent
                                                    • String ID:
                                                    • API String ID: 87235514-0
                                                    • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                                    • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
                                                    • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                                    • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
                                                    APIs
                                                    • GetParent.USER32(?), ref: 00444633
                                                    • GetKeyboardState.USER32(?), ref: 00444648
                                                    • SetKeyboardState.USER32(?), ref: 0044469C
                                                    • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
                                                    • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
                                                    • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
                                                    • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: MessagePost$KeyboardState$Parent
                                                    • String ID:
                                                    • API String ID: 87235514-0
                                                    • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                                    • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
                                                    • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                                    • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
                                                    APIs
                                                    • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
                                                    • ImageList_Remove.COMCTL32(?,?), ref: 004553D3
                                                    • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
                                                    • DeleteObject.GDI32(?), ref: 00455736
                                                    • DeleteObject.GDI32(?), ref: 00455744
                                                    • DestroyIcon.USER32(?), ref: 00455752
                                                    • DestroyWindow.USER32(?), ref: 00455760
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
                                                    • String ID:
                                                    • API String ID: 2354583917-0
                                                    • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                                    • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
                                                    • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                                    • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                                    • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
                                                    • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                                    • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
                                                    APIs
                                                    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
                                                    • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
                                                    • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                    • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                    • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                    • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                    • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Window$Enable$Show$MessageMoveSend
                                                    • String ID:
                                                    • API String ID: 896007046-0
                                                    • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                                    • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
                                                    • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                                    • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
                                                    APIs
                                                    • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
                                                    • GetFocus.USER32 ref: 00448ACF
                                                    • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                    • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                    • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                    • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                    • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Window$Enable$Show$FocusMessageSend
                                                    • String ID:
                                                    • API String ID: 3429747543-0
                                                    • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                                    • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
                                                    • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                                    • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D459
                                                    • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
                                                    • __swprintf.LIBCMT ref: 0045D4E9
                                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$InformationVolume__swprintf
                                                    • String ID: %lu$\VH
                                                    • API String ID: 3164766367-2432546070
                                                    • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                                    • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
                                                    • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                                    • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
                                                    • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
                                                    • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
                                                    • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
                                                    • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID: Msctls_Progress32
                                                    • API String ID: 3850602802-3636473452
                                                    • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                                    • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
                                                    • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                                    • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
                                                    • String ID:
                                                    • API String ID: 3985565216-0
                                                    • Opcode ID: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                                                    • Instruction ID: 510e71718d61fb01ae158a6e5fa7ad280301b7661e5b3aef53c80a3471921dd4
                                                    • Opcode Fuzzy Hash: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                                                    • Instruction Fuzzy Hash: 70217E70200A00EFCB20DF25D9D4A2A77AABF48712F10896DE906CB356D739EC45CB69
                                                    APIs
                                                    • _malloc.LIBCMT ref: 0041F707
                                                      • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                                      • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                                      • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                                    • _free.LIBCMT ref: 0041F71A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: AllocateHeap_free_malloc
                                                    • String ID: [B
                                                    • API String ID: 1020059152-632041663
                                                    • Opcode ID: 5ae3695c4899d33c0c5016eec090c96391fe5f6cd2bec6778d3ea2d81492c429
                                                    • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
                                                    • Opcode Fuzzy Hash: 5ae3695c4899d33c0c5016eec090c96391fe5f6cd2bec6778d3ea2d81492c429
                                                    • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
                                                    APIs
                                                      • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
                                                      • Part of subcall function 00436B19: HeapAlloc.KERNEL32(00000000), ref: 00436B24
                                                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
                                                    • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
                                                    • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
                                                    • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
                                                    • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
                                                    • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
                                                    • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                    • String ID:
                                                    • API String ID: 1957940570-0
                                                    • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                                    • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
                                                    • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                                    • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
                                                    APIs
                                                    • GetClientRect.USER32(?,?), ref: 004302E6
                                                    • GetWindowRect.USER32(00000000,?), ref: 00430316
                                                    • GetClientRect.USER32(?,?), ref: 00430364
                                                    • GetSystemMetrics.USER32(0000000F), ref: 004303B1
                                                    • GetWindowRect.USER32(?,?), ref: 004303C3
                                                    • ScreenToClient.USER32(?,?), ref: 004303EC
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Rect$Client$Window$MetricsScreenSystem
                                                    • String ID:
                                                    • API String ID: 3220332590-0
                                                    • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                                    • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
                                                    • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                                    • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _malloc_wcslen$_strcat_wcscpy
                                                    • String ID:
                                                    • API String ID: 1612042205-0
                                                    • Opcode ID: 1b9af233a2167b707cd0fb77bd31ffbeeda7ae7db272e33850c6ed6ee2362a10
                                                    • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
                                                    • Opcode Fuzzy Hash: 1b9af233a2167b707cd0fb77bd31ffbeeda7ae7db272e33850c6ed6ee2362a10
                                                    • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _memmove_strncmp
                                                    • String ID: >$U$\
                                                    • API String ID: 2666721431-237099441
                                                    • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                                    • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
                                                    • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                                    • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
                                                    APIs
                                                    • GetKeyboardState.USER32(?), ref: 0044C570
                                                    • SetKeyboardState.USER32(00000080), ref: 0044C594
                                                    • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
                                                    • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
                                                    • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
                                                    • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: MessagePost$KeyboardState$InputSend
                                                    • String ID:
                                                    • API String ID: 2221674350-0
                                                    • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                                    • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
                                                    • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                                    • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _wcscpy$_wcscat
                                                    • String ID:
                                                    • API String ID: 2037614760-0
                                                    • Opcode ID: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                                                    • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
                                                    • Opcode Fuzzy Hash: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                                                    • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
                                                    APIs
                                                    • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                                    • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                                    • VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                                    • VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                                    • VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                                    • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Variant$Copy$AllocClearErrorLastString
                                                    • String ID:
                                                    • API String ID: 960795272-0
                                                    • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                                    • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
                                                    • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                                    • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
                                                    APIs
                                                    • BeginPaint.USER32(00000000,?), ref: 00447BDF
                                                    • GetWindowRect.USER32(?,?), ref: 00447C5D
                                                    • ScreenToClient.USER32(?,?), ref: 00447C7B
                                                    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                                    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                                    • EndPaint.USER32(?,?), ref: 00447D13
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
                                                    • String ID:
                                                    • API String ID: 4189319755-0
                                                    • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                                    • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
                                                    • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                                    • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
                                                    APIs
                                                    • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
                                                    • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
                                                    • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
                                                    • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 004490D4
                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004490E1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$LongWindow$InvalidateRect
                                                    • String ID:
                                                    • API String ID: 1976402638-0
                                                    • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                                    • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
                                                    • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                                    • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
                                                    APIs
                                                    • ShowWindow.USER32(?,00000000), ref: 00440A8A
                                                    • EnableWindow.USER32(?,00000000), ref: 00440AAF
                                                    • ShowWindow.USER32(?,00000000), ref: 00440B18
                                                    • ShowWindow.USER32(?,00000004), ref: 00440B2B
                                                    • EnableWindow.USER32(?,00000001), ref: 00440B50
                                                    • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Window$Show$Enable$MessageSend
                                                    • String ID:
                                                    • API String ID: 642888154-0
                                                    • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                                    • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
                                                    • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                                    • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
                                                    APIs
                                                    • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
                                                    • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                    • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                    • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                    • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                    • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Window$Enable$Show$MessageSend
                                                    • String ID:
                                                    • API String ID: 1871949834-0
                                                    • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                                    • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
                                                    • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                                    • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                                    • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
                                                    • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                                    • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
                                                    APIs
                                                    • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
                                                    • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
                                                    • ImageList_ReplaceIcon.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
                                                    • SendMessageW.USER32 ref: 00471AE3
                                                    • DestroyIcon.USER32(?), ref: 00471AF4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Icon$ImageList_MessageSend$CreateDestroyExtractReplace
                                                    • String ID:
                                                    • API String ID: 3611059338-0
                                                    • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                                    • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
                                                    • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                                    • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: DestroyWindow$DeleteObject$IconMove
                                                    • String ID:
                                                    • API String ID: 1640429340-0
                                                    • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                                    • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
                                                    • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                                    • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
                                                    APIs
                                                      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                    • _wcslen.LIBCMT ref: 004438CD
                                                    • _wcslen.LIBCMT ref: 004438E6
                                                    • _wcstok.LIBCMT ref: 004438F8
                                                    • _wcslen.LIBCMT ref: 0044390C
                                                    • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
                                                    • _wcstok.LIBCMT ref: 00443931
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
                                                    • String ID:
                                                    • API String ID: 3632110297-0
                                                    • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                                    • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
                                                    • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                                    • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Destroy$DeleteMenuObject$IconWindow
                                                    • String ID:
                                                    • API String ID: 752480666-0
                                                    • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                                    • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
                                                    • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                                    • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                                    • String ID:
                                                    • API String ID: 3275902921-0
                                                    • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                                    • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
                                                    • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                                    • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                                    • String ID:
                                                    • API String ID: 3275902921-0
                                                    • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                                    • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
                                                    • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                                    • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
                                                    APIs
                                                    • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                                    • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
                                                    • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
                                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: PerformanceQuery$CounterSleep$Frequency
                                                    • String ID:
                                                    • API String ID: 2833360925-0
                                                    • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                                    • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
                                                    • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                                    • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
                                                    APIs
                                                    • SendMessageW.USER32 ref: 004555C7
                                                    • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
                                                    • DeleteObject.GDI32(?), ref: 00455736
                                                    • DeleteObject.GDI32(?), ref: 00455744
                                                    • DestroyIcon.USER32(?), ref: 00455752
                                                    • DestroyWindow.USER32(?), ref: 00455760
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: DeleteDestroyMessageObjectSend$IconWindow
                                                    • String ID:
                                                    • API String ID: 3691411573-0
                                                    • Opcode ID: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                                                    • Instruction ID: 7bbaf3a525edecc9c7f674a1bc178dbce74773f27e06def1294b58b6a87c9b54
                                                    • Opcode Fuzzy Hash: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                                                    • Instruction Fuzzy Hash: 3D116071204601DBC710DF69EDC8A2A77A8FB58322F10466AFD10DB292D779D849CB68
                                                    APIs
                                                      • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                      • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                      • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                                    • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
                                                    • LineTo.GDI32(?,?,?), ref: 004472AC
                                                    • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
                                                    • LineTo.GDI32(?,?,?), ref: 004472C6
                                                    • EndPath.GDI32(?), ref: 004472D6
                                                    • StrokePath.GDI32(?), ref: 004472E4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                                                    • String ID:
                                                    • API String ID: 372113273-0
                                                    • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                                    • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
                                                    • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                                    • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
                                                    APIs
                                                    • GetDC.USER32(00000000), ref: 0044CC6D
                                                    • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC78
                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC84
                                                    • ReleaseDC.USER32(00000000,00000000), ref: 0044CC90
                                                    • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCA8
                                                    • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCB9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: CapsDevice$Release
                                                    • String ID:
                                                    • API String ID: 1035833867-0
                                                    • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                                    • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
                                                    • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                                    • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
                                                    APIs
                                                    • __getptd.LIBCMT ref: 0041708E
                                                      • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                                      • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                                    • __amsg_exit.LIBCMT ref: 004170AE
                                                    • __lock.LIBCMT ref: 004170BE
                                                    • InterlockedDecrement.KERNEL32(?), ref: 004170DB
                                                    • _free.LIBCMT ref: 004170EE
                                                    • InterlockedIncrement.KERNEL32(02EF17F0), ref: 00417106
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                                    • String ID:
                                                    • API String ID: 3470314060-0
                                                    • Opcode ID: 24516f4010ce0b93e8566e6a8de288d1d1524a4de8e6263f522fbb499f39661f
                                                    • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
                                                    • Opcode Fuzzy Hash: 24516f4010ce0b93e8566e6a8de288d1d1524a4de8e6263f522fbb499f39661f
                                                    • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
                                                    APIs
                                                    • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
                                                    • EnterCriticalSection.KERNEL32(?), ref: 0044B666
                                                    • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
                                                    • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
                                                      • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
                                                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
                                                    • LeaveCriticalSection.KERNEL32(?), ref: 0044B69E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                    • String ID:
                                                    • API String ID: 3495660284-0
                                                    • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                                    • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
                                                    • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                                    • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
                                                    APIs
                                                    • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
                                                    • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
                                                    • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
                                                    • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
                                                    • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Virtual
                                                    • String ID:
                                                    • API String ID: 4278518827-0
                                                    • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                                    • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
                                                    • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                                    • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
                                                    APIs
                                                    • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                                      • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                      • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                    • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                                      • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                    • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                                    • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                                    • ExitThread.KERNEL32 ref: 004151ED
                                                    • __freefls@4.LIBCMT ref: 00415209
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                                    • String ID:
                                                    • API String ID: 442100245-0
                                                    • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                                    • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
                                                    • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                                    • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
                                                    APIs
                                                      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                    • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
                                                    • _wcslen.LIBCMT ref: 0045F94A
                                                    • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
                                                    • String ID: 0
                                                    • API String ID: 621800784-4108050209
                                                    • Opcode ID: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
                                                    • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
                                                    • Opcode Fuzzy Hash: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
                                                    • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
                                                    APIs
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • SetErrorMode.KERNEL32 ref: 004781CE
                                                    • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
                                                      • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                    • SetErrorMode.KERNEL32(?), ref: 00478270
                                                    • SetErrorMode.KERNEL32(?), ref: 00478340
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$AttributesFile_memmove_wcslen
                                                    • String ID: \VH
                                                    • API String ID: 3884216118-234962358
                                                    • Opcode ID: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                                    • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
                                                    • Opcode Fuzzy Hash: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                                    • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
                                                    APIs
                                                    • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
                                                    • IsMenu.USER32(?), ref: 0044854D
                                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
                                                    • DrawMenuBar.USER32 ref: 004485AF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Menu$Item$DrawInfoInsert
                                                    • String ID: 0
                                                    • API String ID: 3076010158-4108050209
                                                    • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                                    • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
                                                    • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                                    • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
                                                    APIs
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
                                                    • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
                                                    • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
                                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$_memmove_wcslen
                                                    • String ID: ComboBox$ListBox
                                                    • API String ID: 1589278365-1403004172
                                                    • Opcode ID: 4395ff4c2c8cdf0c8fa99ec605851f177d12593d5a8a66f2884a0b9051c55526
                                                    • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
                                                    • Opcode Fuzzy Hash: 4395ff4c2c8cdf0c8fa99ec605851f177d12593d5a8a66f2884a0b9051c55526
                                                    • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Handle
                                                    • String ID: nul
                                                    • API String ID: 2519475695-2873401336
                                                    • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                                    • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
                                                    • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                                    • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
                                                    APIs
                                                    • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Handle
                                                    • String ID: nul
                                                    • API String ID: 2519475695-2873401336
                                                    • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                                    • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
                                                    • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                                    • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
                                                    APIs
                                                    • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
                                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                    • _wcsncpy.LIBCMT ref: 00401C41
                                                    • _wcscpy.LIBCMT ref: 00401C5D
                                                    • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
                                                    • String ID: Line:
                                                    • API String ID: 1874344091-1585850449
                                                    • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                                    • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
                                                    • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                                    • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: SysAnimate32
                                                    • API String ID: 0-1011021900
                                                    • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                                    • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
                                                    • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                                    • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
                                                    APIs
                                                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                      • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                                      • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                                      • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
                                                      • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
                                                    • GetFocus.USER32 ref: 0046157B
                                                      • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
                                                      • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
                                                    • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
                                                    • EnumChildWindows.USER32(?,Function_00045B98,?), ref: 004615EF
                                                    • __swprintf.LIBCMT ref: 00461608
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_memmove_wcslen
                                                    • String ID: %s%d
                                                    • API String ID: 2645982514-1110647743
                                                    • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                                    • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
                                                    • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                                    • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                                    • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
                                                    • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                                    • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
                                                    APIs
                                                    • GetCurrentProcessId.KERNEL32(?), ref: 0047584D
                                                    • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047585B
                                                    • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047587F
                                                    • CloseHandle.KERNEL32(00000000), ref: 00475A4D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Process$CloseCountersCurrentHandleOpen
                                                    • String ID:
                                                    • API String ID: 3488606520-0
                                                    • Opcode ID: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                                                    • Instruction ID: 747e8e91012d04cc7bcfbda4f2b49d0ca9967bea8b965680eccea6cdbc9dea0c
                                                    • Opcode Fuzzy Hash: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                                                    • Instruction Fuzzy Hash: 82817170A047029FD310DF65C981B4BBBE1BF84704F10892EF6999B3D2DA75E944CB96
                                                    APIs
                                                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ConnectRegistry_memmove_wcslen
                                                    • String ID:
                                                    • API String ID: 15295421-0
                                                    • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                                    • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
                                                    • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                                    • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
                                                    APIs
                                                    • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
                                                    • GetProcAddress.KERNEL32(?,?), ref: 004648F7
                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
                                                    • GetProcAddress.KERNEL32(?,?), ref: 0046495A
                                                    • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$Library$FreeLoad
                                                    • String ID:
                                                    • API String ID: 2449869053-0
                                                    • Opcode ID: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                                                    • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
                                                    • Opcode Fuzzy Hash: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                                                    • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
                                                    APIs
                                                    • GetCursorPos.USER32(?), ref: 004563A6
                                                    • ScreenToClient.USER32(?,?), ref: 004563C3
                                                    • GetAsyncKeyState.USER32(?), ref: 00456400
                                                    • GetAsyncKeyState.USER32(?), ref: 00456410
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00456466
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: AsyncState$ClientCursorLongScreenWindow
                                                    • String ID:
                                                    • API String ID: 3539004672-0
                                                    • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                                    • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
                                                    • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                                    • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
                                                    APIs
                                                    • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
                                                    • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
                                                    • Sleep.KERNEL32(0000000A), ref: 0047D455
                                                    • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
                                                    • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Interlocked$DecrementIncrement$Sleep
                                                    • String ID:
                                                    • API String ID: 327565842-0
                                                    • Opcode ID: 9dc5377443ce6d6d6f4d2094a12b75972c96b6e0f004f6bf3202481cb4e98956
                                                    • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
                                                    • Opcode Fuzzy Hash: 9dc5377443ce6d6d6f4d2094a12b75972c96b6e0f004f6bf3202481cb4e98956
                                                    • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
                                                    APIs
                                                    • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
                                                    • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
                                                    • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
                                                    • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
                                                    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: PrivateProfile$SectionWrite$String
                                                    • String ID:
                                                    • API String ID: 2832842796-0
                                                    • Opcode ID: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
                                                    • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
                                                    • Opcode Fuzzy Hash: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
                                                    • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
                                                    APIs
                                                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
                                                    • RegCloseKey.ADVAPI32(?), ref: 00441CFE
                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
                                                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Enum$CloseDeleteOpen
                                                    • String ID:
                                                    • API String ID: 2095303065-0
                                                    • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                                    • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
                                                    • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                                    • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
                                                    APIs
                                                    • GetWindowRect.USER32(?,?), ref: 00436A24
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: RectWindow
                                                    • String ID:
                                                    • API String ID: 861336768-0
                                                    • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                                    • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
                                                    • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                                    • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
                                                    APIs
                                                    • SendMessageW.USER32 ref: 00449598
                                                      • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                                    • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
                                                    • _wcslen.LIBCMT ref: 0044960D
                                                    • _wcslen.LIBCMT ref: 0044961A
                                                    • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$_wcslen$_wcspbrk
                                                    • String ID:
                                                    • API String ID: 1856069659-0
                                                    • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                                    • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
                                                    • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                                    • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
                                                    APIs
                                                    • GetCursorPos.USER32(?), ref: 004478E2
                                                    • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
                                                    • DefDlgProcW.USER32(?,0000007B,?,?), ref: 0044791D
                                                    • GetCursorPos.USER32(00000000), ref: 0044796A
                                                    • TrackPopupMenuEx.USER32(02EF6420,00000000,00000000,?,?,00000000), ref: 00447991
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: CursorMenuPopupTrack$Proc
                                                    • String ID:
                                                    • API String ID: 1300944170-0
                                                    • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                                    • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
                                                    • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                                    • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
                                                    APIs
                                                    • GetClientRect.USER32(?,?), ref: 004479CC
                                                    • GetCursorPos.USER32(?), ref: 004479D7
                                                    • ScreenToClient.USER32(?,?), ref: 004479F3
                                                    • WindowFromPoint.USER32(?,?), ref: 00447A34
                                                    • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447AAD
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Client$CursorFromPointProcRectScreenWindow
                                                    • String ID:
                                                    • API String ID: 1822080540-0
                                                    • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                                    • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
                                                    • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                                    • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
                                                    APIs
                                                    • GetWindowRect.USER32(?,?), ref: 00447C5D
                                                    • ScreenToClient.USER32(?,?), ref: 00447C7B
                                                    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                                    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                                    • EndPaint.USER32(?,?), ref: 00447D13
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ClientPaintRectRectangleScreenViewportWindow
                                                    • String ID:
                                                    • API String ID: 659298297-0
                                                    • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                                    • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
                                                    • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                                    • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
                                                    APIs
                                                    • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                    • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                    • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                    • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                    • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                      • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
                                                      • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
                                                      • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
                                                      • Part of subcall function 00440D98: SendMessageW.USER32(02EF1BC0,000000F1,00000000,00000000), ref: 00440E6E
                                                      • Part of subcall function 00440D98: SendMessageW.USER32(02EF1BC0,000000F1,00000001,00000000), ref: 00440E9A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Window$EnableMessageSend$LongShow
                                                    • String ID:
                                                    • API String ID: 142311417-0
                                                    • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                                    • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
                                                    • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                                    • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                                    • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
                                                    • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                                    • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
                                                    APIs
                                                    • IsWindowVisible.USER32(?), ref: 00445879
                                                    • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
                                                    • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
                                                    • _wcslen.LIBCMT ref: 004458FB
                                                    • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
                                                    • String ID:
                                                    • API String ID: 3087257052-0
                                                    • Opcode ID: f69ffadf962ece00da2d3b786a5ca76815724ee7e4437aac7967cccaf73e78c3
                                                    • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
                                                    • Opcode Fuzzy Hash: f69ffadf962ece00da2d3b786a5ca76815724ee7e4437aac7967cccaf73e78c3
                                                    • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
                                                    APIs
                                                      • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                                    • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 004653FE
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
                                                    • connect.WSOCK32(00000000,?,00000010), ref: 00465446
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
                                                    • closesocket.WSOCK32(00000000,00000000), ref: 00465481
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$closesocketconnectinet_addrsocket
                                                    • String ID:
                                                    • API String ID: 245547762-0
                                                    • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                                    • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
                                                    • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                                    • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
                                                    APIs
                                                    • DeleteObject.GDI32(00000000), ref: 004471D8
                                                    • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                    • SelectObject.GDI32(?,00000000), ref: 00447228
                                                    • BeginPath.GDI32(?), ref: 0044723D
                                                    • SelectObject.GDI32(?,00000000), ref: 00447266
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Object$Select$BeginCreateDeletePath
                                                    • String ID:
                                                    • API String ID: 2338827641-0
                                                    • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                                    • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
                                                    • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                                    • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
                                                    APIs
                                                    • Sleep.KERNEL32(00000000), ref: 00434598
                                                    • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
                                                    • Sleep.KERNEL32(00000000), ref: 004345D4
                                                    • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: CounterPerformanceQuerySleep
                                                    • String ID:
                                                    • API String ID: 2875609808-0
                                                    • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                                    • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
                                                    • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                                    • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
                                                    APIs
                                                    • GetDlgItem.USER32(?,000003E9), ref: 00460C17
                                                    • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
                                                    • MessageBeep.USER32(00000000), ref: 00460C46
                                                    • KillTimer.USER32(?,0000040A), ref: 00460C68
                                                    • EndDialog.USER32(?,00000001), ref: 00460C83
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                    • String ID:
                                                    • API String ID: 3741023627-0
                                                    • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                                    • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
                                                    • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                                    • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Destroy$DeleteObjectWindow$Icon
                                                    • String ID:
                                                    • API String ID: 4023252218-0
                                                    • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                                    • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
                                                    • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                                    • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
                                                    APIs
                                                    • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
                                                    • DeleteObject.GDI32(?), ref: 00455736
                                                    • DeleteObject.GDI32(?), ref: 00455744
                                                    • DestroyIcon.USER32(?), ref: 00455752
                                                    • DestroyWindow.USER32(?), ref: 00455760
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: DeleteDestroyObject$IconMessageSendWindow
                                                    • String ID:
                                                    • API String ID: 1489400265-0
                                                    • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                                    • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
                                                    • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                                    • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
                                                    APIs
                                                      • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                                    • DestroyWindow.USER32(?), ref: 00455728
                                                    • DeleteObject.GDI32(?), ref: 00455736
                                                    • DeleteObject.GDI32(?), ref: 00455744
                                                    • DestroyIcon.USER32(?), ref: 00455752
                                                    • DestroyWindow.USER32(?), ref: 00455760
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
                                                    • String ID:
                                                    • API String ID: 1042038666-0
                                                    • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                                    • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
                                                    • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                                    • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
                                                    APIs
                                                    • __getptd.LIBCMT ref: 0041780F
                                                      • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                                      • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                                    • __getptd.LIBCMT ref: 00417826
                                                    • __amsg_exit.LIBCMT ref: 00417834
                                                    • __lock.LIBCMT ref: 00417844
                                                    • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                    • String ID:
                                                    • API String ID: 938513278-0
                                                    • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                                    • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
                                                    • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                                    • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
                                                    APIs
                                                      • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                                                    • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                                      • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                      • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                    • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                                      • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                    • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                                    • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                                    • ExitThread.KERNEL32 ref: 004151ED
                                                    • __freefls@4.LIBCMT ref: 00415209
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                                    • String ID:
                                                    • API String ID: 4247068974-0
                                                    • Opcode ID: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                                    • Instruction ID: 3b3fb4cf1982b2ada2e5851f983e2cc6228237abb2dca353483d11accd99f00a
                                                    • Opcode Fuzzy Hash: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                                    • Instruction Fuzzy Hash: E5E0B631848705AECB013BB29D1E9DF3A799E54749B20082ABE1492122EE6C88D1C669
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: )$U$\
                                                    • API String ID: 0-3705770531
                                                    • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                                    • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
                                                    • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                                    • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
                                                    APIs
                                                      • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                                    • CoInitialize.OLE32(00000000), ref: 0046E505
                                                    • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
                                                    • CoUninitialize.OLE32 ref: 0046E53D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                    • String ID: .lnk
                                                    • API String ID: 886957087-24824748
                                                    • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                                    • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
                                                    • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                                    • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: \
                                                    • API String ID: 4104443479-2967466578
                                                    • Opcode ID: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                                                    • Instruction ID: 90b25fc4546a2c21e21e7939c456fa175a28996bec6c3309f7edcf8d77039fcb
                                                    • Opcode Fuzzy Hash: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                                                    • Instruction Fuzzy Hash: 8AB1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: \
                                                    • API String ID: 4104443479-2967466578
                                                    • Opcode ID: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                                                    • Instruction ID: 47d8400a167da4587eb122393216330e55bf30386b581c043e0675457d4a745f
                                                    • Opcode Fuzzy Hash: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                                                    • Instruction Fuzzy Hash: F1B1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: \
                                                    • API String ID: 4104443479-2967466578
                                                    • Opcode ID: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                                                    • Instruction ID: 4d1558bed40bbae7f26d93592334ac0d2c658ca85fbb7fec499742c135aa7d63
                                                    • Opcode Fuzzy Hash: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                                                    • Instruction Fuzzy Hash: E5A1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED441AB381D7795946CB1A
                                                    Strings
                                                    • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
                                                    • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                    • API String ID: 708495834-557222456
                                                    • Opcode ID: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
                                                    • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
                                                    • Opcode Fuzzy Hash: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
                                                    • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
                                                    APIs
                                                      • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                                    • CoInitialize.OLE32(00000000), ref: 00478442
                                                    • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
                                                    • CoUninitialize.OLE32 ref: 0047863C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                    • String ID: .lnk
                                                    • API String ID: 886957087-24824748
                                                    • Opcode ID: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                                                    • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
                                                    • Opcode Fuzzy Hash: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                                                    • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
                                                    APIs
                                                      • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
                                                    • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
                                                      • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
                                                      • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
                                                      • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
                                                      • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
                                                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
                                                    • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                    • String ID: @
                                                    • API String ID: 4150878124-2766056989
                                                    • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                                    • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
                                                    • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                                    • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: \$]$h
                                                    • API String ID: 4104443479-3262404753
                                                    • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                                    • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
                                                    • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                                    • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
                                                    APIs
                                                    • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
                                                      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                    • CloseHandle.KERNEL32(?), ref: 00457E09
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: CloseExecuteHandleShell_wcscpy_wcslen
                                                    • String ID: <$@
                                                    • API String ID: 2417854910-1426351568
                                                    • Opcode ID: 456975d6943100b9bccf6a944bdff1bb50055e47ea808eda8884d41227499f4e
                                                    • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
                                                    • Opcode Fuzzy Hash: 456975d6943100b9bccf6a944bdff1bb50055e47ea808eda8884d41227499f4e
                                                    • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
                                                    APIs
                                                    • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
                                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
                                                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
                                                      • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
                                                    • String ID:
                                                    • API String ID: 3705125965-3916222277
                                                    • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                                    • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
                                                    • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                                    • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
                                                    APIs
                                                    • GetMenuItemInfoW.USER32 ref: 0045FAC4
                                                    • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
                                                    • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Menu$Delete$InfoItem
                                                    • String ID: 0
                                                    • API String ID: 135850232-4108050209
                                                    • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                                    • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
                                                    • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                                    • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
                                                    APIs
                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 0045087D
                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0045088E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Window$Long
                                                    • String ID: SysTreeView32
                                                    • API String ID: 847901565-1698111956
                                                    • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                                    • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
                                                    • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                                    • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(?), ref: 00434B10
                                                    • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
                                                    • FreeLibrary.KERNEL32(?), ref: 00434B9F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Library$AddressFreeLoadProc
                                                    • String ID: AU3_GetPluginDetails
                                                    • API String ID: 145871493-4132174516
                                                    • Opcode ID: 525874d34911f66d3e6dd89a42f64d0fb8abb6a055dcd3ee386d4a3c405b38ac
                                                    • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
                                                    • Opcode Fuzzy Hash: 525874d34911f66d3e6dd89a42f64d0fb8abb6a055dcd3ee386d4a3c405b38ac
                                                    • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
                                                    APIs
                                                    • DestroyWindow.USER32(00000000), ref: 00450A2F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: DestroyWindow
                                                    • String ID: msctls_updown32
                                                    • API String ID: 3375834691-2298589950
                                                    • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                                    • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
                                                    • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                                    • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: $<
                                                    • API String ID: 4104443479-428540627
                                                    • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                                    • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
                                                    • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                                    • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                                    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$DiskFreeSpace
                                                    • String ID: \VH
                                                    • API String ID: 1682464887-234962358
                                                    • Opcode ID: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                                    • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
                                                    • Opcode Fuzzy Hash: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                                    • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                                    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$DiskFreeSpace
                                                    • String ID: \VH
                                                    • API String ID: 1682464887-234962358
                                                    • Opcode ID: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                                    • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
                                                    • Opcode Fuzzy Hash: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                                    • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
                                                    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
                                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$DiskFreeSpace
                                                    • String ID: \VH
                                                    • API String ID: 1682464887-234962358
                                                    • Opcode ID: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                                    • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
                                                    • Opcode Fuzzy Hash: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                                    • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
                                                    • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3F4
                                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$InformationVolume
                                                    • String ID: \VH
                                                    • API String ID: 2507767853-234962358
                                                    • Opcode ID: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                                    • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
                                                    • Opcode Fuzzy Hash: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                                    • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
                                                    • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D5D2
                                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$InformationVolume
                                                    • String ID: \VH
                                                    • API String ID: 2507767853-234962358
                                                    • Opcode ID: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                                    • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
                                                    • Opcode Fuzzy Hash: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                                    • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
                                                    • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
                                                    • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID: msctls_trackbar32
                                                    • API String ID: 3850602802-1010561917
                                                    • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                                    • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
                                                    • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                                    • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
                                                    APIs
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • CLSIDFromString.OLE32(?,00000000), ref: 00435236
                                                    • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
                                                    • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
                                                    • String ID: crts
                                                    • API String ID: 943502515-3724388283
                                                    • Opcode ID: 1c951fdfbdf5c5f88c618ab4611406fe4b678f9348836ee2954194ca176c3974
                                                    • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
                                                    • Opcode Fuzzy Hash: 1c951fdfbdf5c5f88c618ab4611406fe4b678f9348836ee2954194ca176c3974
                                                    • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
                                                    • SetVolumeLabelW.KERNEL32(?,00000000), ref: 0045D331
                                                    • SetErrorMode.KERNEL32(?), ref: 0045D35C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$LabelVolume
                                                    • String ID: \VH
                                                    • API String ID: 2006950084-234962358
                                                    • Opcode ID: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                                    • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
                                                    • Opcode Fuzzy Hash: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                                    • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
                                                    APIs
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • GetMenuItemInfoW.USER32 ref: 00449727
                                                    • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
                                                    • DrawMenuBar.USER32 ref: 00449761
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Menu$InfoItem$Draw_malloc
                                                    • String ID: 0
                                                    • API String ID: 772068139-4108050209
                                                    • Opcode ID: 1167fa92614d233b3003e6fb28f1152d6dc9f7ab2b98f531c98f2f78594b2958
                                                    • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
                                                    • Opcode Fuzzy Hash: 1167fa92614d233b3003e6fb28f1152d6dc9f7ab2b98f531c98f2f78594b2958
                                                    • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$_wcscpy
                                                    • String ID: 3, 3, 8, 1
                                                    • API String ID: 3469035223-357260408
                                                    • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                                    • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
                                                    • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                                    • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
                                                    • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID: ICMP.DLL$IcmpCloseHandle
                                                    • API String ID: 2574300362-3530519716
                                                    • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                                    • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
                                                    • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                                    • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
                                                    • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID: ICMP.DLL$IcmpCreateFile
                                                    • API String ID: 2574300362-275556492
                                                    • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                                    • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
                                                    • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                                    • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
                                                    • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID: ICMP.DLL$IcmpSendEcho
                                                    • API String ID: 2574300362-58917771
                                                    • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                                    • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
                                                    • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                                    • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
                                                    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID: RegDeleteKeyExW$advapi32.dll
                                                    • API String ID: 2574300362-4033151799
                                                    • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                                    • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
                                                    • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                                    • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
                                                    APIs
                                                    • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
                                                    • __itow.LIBCMT ref: 004699CD
                                                      • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
                                                    • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
                                                    • __itow.LIBCMT ref: 00469A97
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$__itow
                                                    • String ID:
                                                    • API String ID: 3379773720-0
                                                    • Opcode ID: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                                    • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
                                                    • Opcode Fuzzy Hash: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                                    • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
                                                    APIs
                                                    • GetWindowRect.USER32(?,?), ref: 00449A4A
                                                    • ScreenToClient.USER32(?,?), ref: 00449A80
                                                    • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Window$ClientMoveRectScreen
                                                    • String ID:
                                                    • API String ID: 3880355969-0
                                                    • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                                    • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
                                                    • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                                    • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                    • String ID:
                                                    • API String ID: 2782032738-0
                                                    • Opcode ID: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                                                    • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
                                                    • Opcode Fuzzy Hash: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                                                    • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
                                                    APIs
                                                    • ClientToScreen.USER32(00000000,?), ref: 0044169A
                                                    • GetWindowRect.USER32(?,?), ref: 00441722
                                                    • PtInRect.USER32(?,?,?), ref: 00441734
                                                    • MessageBeep.USER32(00000000), ref: 004417AD
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Rect$BeepClientMessageScreenWindow
                                                    • String ID:
                                                    • API String ID: 1352109105-0
                                                    • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                                    • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
                                                    • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                                    • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
                                                    APIs
                                                    • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
                                                    • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
                                                    • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
                                                    • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: CreateHardLink$DeleteErrorFileLast
                                                    • String ID:
                                                    • API String ID: 3321077145-0
                                                    • Opcode ID: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                                    • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
                                                    • Opcode Fuzzy Hash: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                                    • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
                                                    APIs
                                                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
                                                    • __isleadbyte_l.LIBCMT ref: 004208A6
                                                    • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
                                                    • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                    • String ID:
                                                    • API String ID: 3058430110-0
                                                    • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                                    • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
                                                    • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                                    • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
                                                    APIs
                                                    • GetParent.USER32(?), ref: 004503C8
                                                    • DefDlgProcW.USER32(?,00000138,?,?), ref: 00450417
                                                    • DefDlgProcW.USER32(?,00000133,?,?), ref: 00450466
                                                    • DefDlgProcW.USER32(?,00000134,?,?), ref: 00450497
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Proc$Parent
                                                    • String ID:
                                                    • API String ID: 2351499541-0
                                                    • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                                    • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
                                                    • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                                    • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
                                                    APIs
                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
                                                    • TranslateMessage.USER32(?), ref: 00442B01
                                                    • DispatchMessageW.USER32(?), ref: 00442B0B
                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Message$Peek$DispatchTranslate
                                                    • String ID:
                                                    • API String ID: 1795658109-0
                                                    • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                                    • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
                                                    • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                                    • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
                                                    APIs
                                                    • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
                                                      • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                                      • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                                      • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                                    • GetCaretPos.USER32(?), ref: 004743B2
                                                    • ClientToScreen.USER32(00000000,?), ref: 004743E8
                                                    • GetForegroundWindow.USER32 ref: 004743EE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                    • String ID:
                                                    • API String ID: 2759813231-0
                                                    • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                                    • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
                                                    • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                                    • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
                                                    APIs
                                                      • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                                    • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
                                                    • _wcslen.LIBCMT ref: 00449519
                                                    • _wcslen.LIBCMT ref: 00449526
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: MessageSend_wcslen$_wcspbrk
                                                    • String ID:
                                                    • API String ID: 2886238975-0
                                                    • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                                    • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
                                                    • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                                    • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: __setmode$DebugOutputString_fprintf
                                                    • String ID:
                                                    • API String ID: 1792727568-0
                                                    • Opcode ID: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
                                                    • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
                                                    • Opcode Fuzzy Hash: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
                                                    • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
                                                    APIs
                                                      • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                                    • GetWindowLongW.USER32(?,000000EC), ref: 0047A2DF
                                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A2FA
                                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A312
                                                    • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A321
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Window$Long$AttributesLayered
                                                    • String ID:
                                                    • API String ID: 2169480361-0
                                                    • Opcode ID: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                                    • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
                                                    • Opcode Fuzzy Hash: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                                    • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
                                                    APIs
                                                      • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
                                                      • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
                                                      • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
                                                    • lstrlenW.KERNEL32(?), ref: 00434CF6
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
                                                    • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: lstrcmpilstrcpylstrlen$_malloc
                                                    • String ID: cdecl
                                                    • API String ID: 3850814276-3896280584
                                                    • Opcode ID: 21c69cf6c29ea855f725dfe2a9cb2720d4b8dbea94fc3a7d57af4f6d050de3c2
                                                    • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
                                                    • Opcode Fuzzy Hash: 21c69cf6c29ea855f725dfe2a9cb2720d4b8dbea94fc3a7d57af4f6d050de3c2
                                                    • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
                                                    APIs
                                                      • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                                    • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046D42D
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
                                                    • _memmove.LIBCMT ref: 0046D475
                                                    • inet_ntoa.WSOCK32(?), ref: 0046D481
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
                                                    • String ID:
                                                    • API String ID: 2502553879-0
                                                    • Opcode ID: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                                                    • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
                                                    • Opcode Fuzzy Hash: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                                                    • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
                                                    APIs
                                                    • SendMessageW.USER32 ref: 00448C69
                                                    • GetWindowLongW.USER32(?,000000EC), ref: 00448C91
                                                    • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
                                                    • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$LongWindow
                                                    • String ID:
                                                    • API String ID: 312131281-0
                                                    • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                                    • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
                                                    • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                                    • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
                                                    APIs
                                                    • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
                                                    • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
                                                    • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastacceptselect
                                                    • String ID:
                                                    • API String ID: 385091864-0
                                                    • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                                    • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
                                                    • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                                    • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
                                                    APIs
                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID:
                                                    • API String ID: 3850602802-0
                                                    • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                                    • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
                                                    • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                                    • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00400000,00000000), ref: 00430242
                                                    • GetStockObject.GDI32(00000011), ref: 00430258
                                                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
                                                    • ShowWindow.USER32(00000000,00000000), ref: 0043027D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Window$CreateMessageObjectSendShowStock
                                                    • String ID:
                                                    • API String ID: 1358664141-0
                                                    • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                                    • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
                                                    • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                                    • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
                                                    APIs
                                                    • GetCurrentThreadId.KERNEL32 ref: 00443CA6
                                                    • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
                                                    • CloseHandle.KERNEL32(00000000), ref: 00443CF9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                    • String ID:
                                                    • API String ID: 2880819207-0
                                                    • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                                    • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
                                                    • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                                    • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
                                                    APIs
                                                    • GetWindowRect.USER32(?,?), ref: 00430BA2
                                                    • ScreenToClient.USER32(?,?), ref: 00430BC1
                                                    • ScreenToClient.USER32(?,?), ref: 00430BE2
                                                    • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ClientRectScreen$InvalidateWindow
                                                    • String ID:
                                                    • API String ID: 357397906-0
                                                    • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                                    • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
                                                    • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                                    • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
                                                    APIs
                                                    • __wsplitpath.LIBCMT ref: 0043392E
                                                      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                    • __wsplitpath.LIBCMT ref: 00433950
                                                    • __wcsicoll.LIBCMT ref: 00433974
                                                    • __wcsicoll.LIBCMT ref: 0043398A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
                                                    • String ID:
                                                    • API String ID: 1187119602-0
                                                    • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                                    • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
                                                    • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                                    • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$_malloc_wcscat_wcscpy
                                                    • String ID:
                                                    • API String ID: 1597257046-0
                                                    • Opcode ID: 3c6fc8acff7e2f2e7aee9de07fb73a2c390eddda5e8305f0b40f95221864db4e
                                                    • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
                                                    • Opcode Fuzzy Hash: 3c6fc8acff7e2f2e7aee9de07fb73a2c390eddda5e8305f0b40f95221864db4e
                                                    • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
                                                    APIs
                                                    • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
                                                    • __malloc_crt.LIBCMT ref: 0041F5B6
                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: EnvironmentStrings$Free__malloc_crt
                                                    • String ID:
                                                    • API String ID: 237123855-0
                                                    • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                                    • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
                                                    • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                                    • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: DeleteDestroyObject$IconWindow
                                                    • String ID:
                                                    • API String ID: 3349847261-0
                                                    • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                                    • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
                                                    • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                                    • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
                                                    APIs
                                                    • EnterCriticalSection.KERNEL32(?), ref: 0044B5F5
                                                    • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
                                                    • LeaveCriticalSection.KERNEL32(?), ref: 0044B61A
                                                    • LeaveCriticalSection.KERNEL32(?), ref: 0044B62C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$Leave$EnterExchangeInterlocked
                                                    • String ID:
                                                    • API String ID: 2223660684-0
                                                    • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                                    • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
                                                    • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                                    • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
                                                    APIs
                                                      • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                      • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                      • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                                    • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
                                                    • LineTo.GDI32(?,?,?), ref: 00447326
                                                    • EndPath.GDI32(?), ref: 00447336
                                                    • StrokePath.GDI32(?), ref: 00447344
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                                                    • String ID:
                                                    • API String ID: 2783949968-0
                                                    • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                                    • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
                                                    • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                                    • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
                                                    APIs
                                                    • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                                    • GetCurrentThreadId.KERNEL32 ref: 004364A3
                                                    • AttachThreadInput.USER32(00000000), ref: 004364AA
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                    • String ID:
                                                    • API String ID: 2710830443-0
                                                    • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                                    • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
                                                    • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                                    • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
                                                    APIs
                                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
                                                    • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 00436C46
                                                    • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C56
                                                    • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C5B
                                                      • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
                                                      • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                    • String ID:
                                                    • API String ID: 146765662-0
                                                    • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                                    • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
                                                    • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                                    • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
                                                    APIs
                                                    • GetDesktopWindow.USER32 ref: 00472B63
                                                    • GetDC.USER32(00000000), ref: 00472B6C
                                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00472B78
                                                    • ReleaseDC.USER32(00000000,?), ref: 00472B99
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: CapsDesktopDeviceReleaseWindow
                                                    • String ID:
                                                    • API String ID: 2889604237-0
                                                    • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                                    • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
                                                    • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                                    • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
                                                    APIs
                                                    • GetDesktopWindow.USER32 ref: 00472BB2
                                                    • GetDC.USER32(00000000), ref: 00472BBB
                                                    • GetDeviceCaps.GDI32(00000000,00000074), ref: 00472BC7
                                                    • ReleaseDC.USER32(00000000,?), ref: 00472BE8
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: CapsDesktopDeviceReleaseWindow
                                                    • String ID:
                                                    • API String ID: 2889604237-0
                                                    • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                                    • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
                                                    • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                                    • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
                                                    APIs
                                                    • __getptd_noexit.LIBCMT ref: 00415150
                                                      • Part of subcall function 004179F0: GetLastError.KERNEL32(?,?,00417F7C,00413644,?,?,004115F6,?,00401BAC,?,?,?), ref: 004179F4
                                                      • Part of subcall function 004179F0: ___set_flsgetvalue.LIBCMT ref: 00417A02
                                                      • Part of subcall function 004179F0: __calloc_crt.LIBCMT ref: 00417A16
                                                      • Part of subcall function 004179F0: GetCurrentThreadId.KERNEL32 ref: 00417A46
                                                      • Part of subcall function 004179F0: SetLastError.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 00417A5E
                                                    • CloseHandle.KERNEL32(?,?,0041519B), ref: 00415164
                                                    • __freeptd.LIBCMT ref: 0041516B
                                                    • ExitThread.KERNEL32 ref: 00415173
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastThread$CloseCurrentExitHandle___set_flsgetvalue__calloc_crt__freeptd__getptd_noexit
                                                    • String ID:
                                                    • API String ID: 1454798553-0
                                                    • Opcode ID: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                                    • Instruction ID: f82a1693998e09e6351869d5e4a2ded823041337c12103c56f11d560ed0c89ab
                                                    • Opcode Fuzzy Hash: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                                    • Instruction Fuzzy Hash: BCD0A732805E10A7C122273D5C0DBDF26655F40735B140B09FC25872D1CBACDDC143AC
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _strncmp
                                                    • String ID: Q\E
                                                    • API String ID: 909875538-2189900498
                                                    • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                                    • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
                                                    • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                                    • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
                                                    APIs
                                                    • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                      • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
                                                      • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                                      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                                      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                                      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                                      • Part of subcall function 00451B42: VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
                                                    • String ID: AutoIt3GUI$Container
                                                    • API String ID: 2652923123-3941886329
                                                    • Opcode ID: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
                                                    • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
                                                    • Opcode Fuzzy Hash: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
                                                    • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _memmove_strncmp
                                                    • String ID: U$\
                                                    • API String ID: 2666721431-100911408
                                                    • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                                    • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
                                                    • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                                    • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
                                                    APIs
                                                      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                    • __wcsnicmp.LIBCMT ref: 00467288
                                                    • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Connection__wcsnicmp_wcscpy_wcslen
                                                    • String ID: LPT
                                                    • API String ID: 3035604524-1350329615
                                                    • Opcode ID: df00d6e4b866e053a8717e7cd00b83b505630e9b2d4c108cf88e8e3b58e1c49d
                                                    • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
                                                    • Opcode Fuzzy Hash: df00d6e4b866e053a8717e7cd00b83b505630e9b2d4c108cf88e8e3b58e1c49d
                                                    • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: \$h
                                                    • API String ID: 4104443479-677774858
                                                    • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                                    • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
                                                    • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                                    • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _memcmp
                                                    • String ID: &
                                                    • API String ID: 2931989736-1010288
                                                    • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                                    • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
                                                    • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                                    • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: \
                                                    • API String ID: 4104443479-2967466578
                                                    • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                                    • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
                                                    • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                                    • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
                                                    APIs
                                                    • _wcslen.LIBCMT ref: 00466825
                                                    • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: CrackInternet_wcslen
                                                    • String ID: |
                                                    • API String ID: 596671847-2343686810
                                                    • Opcode ID: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                                                    • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
                                                    • Opcode Fuzzy Hash: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                                                    • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
                                                    APIs
                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
                                                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID: '
                                                    • API String ID: 3850602802-1997036262
                                                    • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                                    • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
                                                    • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                                    • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
                                                    APIs
                                                    • _strlen.LIBCMT ref: 0040F858
                                                      • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
                                                      • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
                                                    • _sprintf.LIBCMT ref: 0040F9AE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _memmove$_sprintf_strlen
                                                    • String ID: %02X
                                                    • API String ID: 1921645428-436463671
                                                    • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                                    • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
                                                    • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                                    • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID: Combobox
                                                    • API String ID: 3850602802-2096851135
                                                    • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                                    • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
                                                    • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                                    • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
                                                    APIs
                                                    • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
                                                    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: LengthMessageSendTextWindow
                                                    • String ID: edit
                                                    • API String ID: 2978978980-2167791130
                                                    • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                                    • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
                                                    • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                                    • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
                                                    APIs
                                                    • Sleep.KERNEL32(00000000), ref: 00476CB0
                                                    • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: GlobalMemorySleepStatus
                                                    • String ID: @
                                                    • API String ID: 2783356886-2766056989
                                                    • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                                    • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
                                                    • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                                    • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: htonsinet_addr
                                                    • String ID: 255.255.255.255
                                                    • API String ID: 3832099526-2422070025
                                                    • Opcode ID: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                                                    • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
                                                    • Opcode Fuzzy Hash: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                                                    • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
                                                    APIs
                                                    • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: InternetOpen
                                                    • String ID: <local>
                                                    • API String ID: 2038078732-4266983199
                                                    • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                                    • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
                                                    • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                                    • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: __fread_nolock_memmove
                                                    • String ID: EA06
                                                    • API String ID: 1988441806-3962188686
                                                    • Opcode ID: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                                                    • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
                                                    • Opcode Fuzzy Hash: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                                                    • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _memmove
                                                    • String ID: u,D
                                                    • API String ID: 4104443479-3858472334
                                                    • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                                    • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
                                                    • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                                    • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
                                                    APIs
                                                    • _wcslen.LIBCMT ref: 00401B11
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • _memmove.LIBCMT ref: 00401B57
                                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
                                                    • String ID: @EXITCODE
                                                    • API String ID: 2734553683-3436989551
                                                    • Opcode ID: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
                                                    • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
                                                    • Opcode Fuzzy Hash: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
                                                    • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
                                                    APIs
                                                    • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
                                                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                    • wsprintfW.USER32 ref: 0045612A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: MessageSend_mallocwsprintf
                                                    • String ID: %d/%02d/%02d
                                                    • API String ID: 1262938277-328681919
                                                    • Opcode ID: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
                                                    • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
                                                    • Opcode Fuzzy Hash: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
                                                    • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
                                                    APIs
                                                    • InternetCloseHandle.WININET(?), ref: 00442663
                                                    • InternetCloseHandle.WININET ref: 00442668
                                                      • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: CloseHandleInternet$ObjectSingleWait
                                                    • String ID: aeB
                                                    • API String ID: 857135153-906807131
                                                    • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                                    • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
                                                    • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                                    • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
                                                    APIs
                                                    Strings
                                                    • ^B, xrefs: 00433248
                                                    • C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe, xrefs: 0043324B
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: _wcsncpy
                                                    • String ID: ^B$C:\Users\user\Desktop\rMT103SwiftCopyoFPayment.exe
                                                    • API String ID: 1735881322-301182992
                                                    • Opcode ID: f7c3fd886c497ae33bdd3057849675e3afdb83c7c480df0bc310b3c11edf5eb4
                                                    • Instruction ID: 95fca152a805ab331260cabc3645652019b64b11bc5d0d7a1f408bc65d2df1f2
                                                    • Opcode Fuzzy Hash: f7c3fd886c497ae33bdd3057849675e3afdb83c7c480df0bc310b3c11edf5eb4
                                                    • Instruction Fuzzy Hash: ADE0C23360051A7B9710DE4AD841DBBF37DEEC4A20B08802AF90883200E2B1BD1A43E4
                                                    APIs
                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
                                                    • PostMessageW.USER32(00000000), ref: 00441C05
                                                      • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: FindMessagePostSleepWindow
                                                    • String ID: Shell_TrayWnd
                                                    • API String ID: 529655941-2988720461
                                                    • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                                    • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
                                                    • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                                    • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
                                                    APIs
                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
                                                    • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
                                                      • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: FindMessagePostSleepWindow
                                                    • String ID: Shell_TrayWnd
                                                    • API String ID: 529655941-2988720461
                                                    • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                                    • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
                                                    • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                                    • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
                                                    APIs
                                                    • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
                                                      • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1404929609.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1404910571.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1404986682.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405011723.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405039990.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405091417.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1405169172.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_rMT103SwiftCopyoFPayment.jbxd
                                                    Similarity
                                                    • API ID: Message_doexit
                                                    • String ID: AutoIt$Error allocating memory.
                                                    • API String ID: 1993061046-4017498283
                                                    • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                                    • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
                                                    • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                                    • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D